Date
June 18, 2025, 6:43 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 24.047078] ================================================================== [ 24.047210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 24.047326] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.047429] [ 24.047513] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.047743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.048188] Hardware name: linux,dummy-virt (DT) [ 24.048287] Call trace: [ 24.048345] show_stack+0x20/0x38 (C) [ 24.048481] dump_stack_lvl+0x8c/0xd0 [ 24.048621] print_report+0x118/0x608 [ 24.048743] kasan_report+0xdc/0x128 [ 24.048861] kasan_check_range+0x100/0x1a8 [ 24.048989] __kasan_check_write+0x20/0x30 [ 24.049122] kasan_atomics_helper+0xeb8/0x4858 [ 24.049246] kasan_atomics+0x198/0x2e0 [ 24.049360] kunit_try_run_case+0x170/0x3f0 [ 24.049487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.049622] kthread+0x328/0x630 [ 24.049731] ret_from_fork+0x10/0x20 [ 24.049853] [ 24.049903] Allocated by task 275: [ 24.049978] kasan_save_stack+0x3c/0x68 [ 24.050606] kasan_save_track+0x20/0x40 [ 24.050734] kasan_save_alloc_info+0x40/0x58 [ 24.050846] __kasan_kmalloc+0xd4/0xd8 [ 24.050941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.051162] kasan_atomics+0xb8/0x2e0 [ 24.051336] kunit_try_run_case+0x170/0x3f0 [ 24.051450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.052044] kthread+0x328/0x630 [ 24.052385] ret_from_fork+0x10/0x20 [ 24.052514] [ 24.052580] The buggy address belongs to the object at fff00000c63eb100 [ 24.052580] which belongs to the cache kmalloc-64 of size 64 [ 24.052724] The buggy address is located 0 bytes to the right of [ 24.052724] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.053047] [ 24.053120] The buggy address belongs to the physical page: [ 24.053540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.053820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.053962] page_type: f5(slab) [ 24.054103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.054252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.054406] page dumped because: kasan: bad access detected [ 24.054490] [ 24.054542] Memory state around the buggy address: [ 24.054614] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.054736] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.054848] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.054944] ^ [ 24.055041] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.055369] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.055497] ================================================================== [ 23.838043] ================================================================== [ 23.838646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 23.839188] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.839307] [ 23.839714] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.840356] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.840484] Hardware name: linux,dummy-virt (DT) [ 23.840666] Call trace: [ 23.840736] show_stack+0x20/0x38 (C) [ 23.840941] dump_stack_lvl+0x8c/0xd0 [ 23.841072] print_report+0x118/0x608 [ 23.841189] kasan_report+0xdc/0x128 [ 23.841358] kasan_check_range+0x100/0x1a8 [ 23.841471] __kasan_check_write+0x20/0x30 [ 23.841582] kasan_atomics_helper+0xa04/0x4858 [ 23.841698] kasan_atomics+0x198/0x2e0 [ 23.841816] kunit_try_run_case+0x170/0x3f0 [ 23.841967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.842163] kthread+0x328/0x630 [ 23.842257] ret_from_fork+0x10/0x20 [ 23.842413] [ 23.842454] Allocated by task 275: [ 23.842535] kasan_save_stack+0x3c/0x68 [ 23.842634] kasan_save_track+0x20/0x40 [ 23.842718] kasan_save_alloc_info+0x40/0x58 [ 23.842846] __kasan_kmalloc+0xd4/0xd8 [ 23.842941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.843047] kasan_atomics+0xb8/0x2e0 [ 23.843174] kunit_try_run_case+0x170/0x3f0 [ 23.843257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.843385] kthread+0x328/0x630 [ 23.843559] ret_from_fork+0x10/0x20 [ 23.843668] [ 23.843730] The buggy address belongs to the object at fff00000c63eb100 [ 23.843730] which belongs to the cache kmalloc-64 of size 64 [ 23.843864] The buggy address is located 0 bytes to the right of [ 23.843864] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.844028] [ 23.844100] The buggy address belongs to the physical page: [ 23.844255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.844365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.844472] page_type: f5(slab) [ 23.844600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.844767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.844890] page dumped because: kasan: bad access detected [ 23.844965] [ 23.845032] Memory state around the buggy address: [ 23.845132] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.845236] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.845340] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.845430] ^ [ 23.845507] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.845611] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.845706] ================================================================== [ 24.089663] ================================================================== [ 24.089796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 24.089927] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.090062] [ 24.090909] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.091649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.091889] Hardware name: linux,dummy-virt (DT) [ 24.092321] Call trace: [ 24.092407] show_stack+0x20/0x38 (C) [ 24.093157] dump_stack_lvl+0x8c/0xd0 [ 24.093583] print_report+0x118/0x608 [ 24.093712] kasan_report+0xdc/0x128 [ 24.093822] kasan_check_range+0x100/0x1a8 [ 24.094567] __kasan_check_write+0x20/0x30 [ 24.094804] kasan_atomics_helper+0x1058/0x4858 [ 24.095294] kasan_atomics+0x198/0x2e0 [ 24.095494] kunit_try_run_case+0x170/0x3f0 [ 24.095670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.095998] kthread+0x328/0x630 [ 24.096346] ret_from_fork+0x10/0x20 [ 24.096475] [ 24.096538] Allocated by task 275: [ 24.096618] kasan_save_stack+0x3c/0x68 [ 24.096731] kasan_save_track+0x20/0x40 [ 24.097481] kasan_save_alloc_info+0x40/0x58 [ 24.097932] __kasan_kmalloc+0xd4/0xd8 [ 24.098330] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.098482] kasan_atomics+0xb8/0x2e0 [ 24.098570] kunit_try_run_case+0x170/0x3f0 [ 24.099030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.099227] kthread+0x328/0x630 [ 24.099320] ret_from_fork+0x10/0x20 [ 24.099755] [ 24.099808] The buggy address belongs to the object at fff00000c63eb100 [ 24.099808] which belongs to the cache kmalloc-64 of size 64 [ 24.100592] The buggy address is located 0 bytes to the right of [ 24.100592] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.100813] [ 24.100876] The buggy address belongs to the physical page: [ 24.101295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.101492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.101722] page_type: f5(slab) [ 24.101974] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.102639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.103143] page dumped because: kasan: bad access detected [ 24.103316] [ 24.103671] Memory state around the buggy address: [ 24.103790] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.103902] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.104006] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.104698] ^ [ 24.104923] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.105289] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.105867] ================================================================== [ 24.067121] ================================================================== [ 24.067252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 24.067439] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.067782] [ 24.067904] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.068146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.068349] Hardware name: linux,dummy-virt (DT) [ 24.068550] Call trace: [ 24.068652] show_stack+0x20/0x38 (C) [ 24.069201] dump_stack_lvl+0x8c/0xd0 [ 24.069383] print_report+0x118/0x608 [ 24.069507] kasan_report+0xdc/0x128 [ 24.069617] kasan_check_range+0x100/0x1a8 [ 24.069732] __kasan_check_write+0x20/0x30 [ 24.069839] kasan_atomics_helper+0xf88/0x4858 [ 24.070171] kasan_atomics+0x198/0x2e0 [ 24.070428] kunit_try_run_case+0x170/0x3f0 [ 24.070560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.070696] kthread+0x328/0x630 [ 24.070795] ret_from_fork+0x10/0x20 [ 24.070921] [ 24.070966] Allocated by task 275: [ 24.071066] kasan_save_stack+0x3c/0x68 [ 24.071163] kasan_save_track+0x20/0x40 [ 24.071257] kasan_save_alloc_info+0x40/0x58 [ 24.071360] __kasan_kmalloc+0xd4/0xd8 [ 24.071456] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.071603] kasan_atomics+0xb8/0x2e0 [ 24.071704] kunit_try_run_case+0x170/0x3f0 [ 24.071837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.071987] kthread+0x328/0x630 [ 24.072113] ret_from_fork+0x10/0x20 [ 24.072240] [ 24.072294] The buggy address belongs to the object at fff00000c63eb100 [ 24.072294] which belongs to the cache kmalloc-64 of size 64 [ 24.072439] The buggy address is located 0 bytes to the right of [ 24.072439] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.072628] [ 24.072709] The buggy address belongs to the physical page: [ 24.072821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.072962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.073077] page_type: f5(slab) [ 24.073171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.073295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.073433] page dumped because: kasan: bad access detected [ 24.073519] [ 24.073562] Memory state around the buggy address: [ 24.073644] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.073758] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.073870] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.073988] ^ [ 24.074125] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.074183] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.074230] ================================================================== [ 23.824818] ================================================================== [ 23.824953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 23.825108] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.825243] [ 23.825353] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.825570] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.825631] Hardware name: linux,dummy-virt (DT) [ 23.825700] Call trace: [ 23.825753] show_stack+0x20/0x38 (C) [ 23.825844] dump_stack_lvl+0x8c/0xd0 [ 23.825940] print_report+0x118/0x608 [ 23.826052] kasan_report+0xdc/0x128 [ 23.826242] kasan_check_range+0x100/0x1a8 [ 23.826440] __kasan_check_write+0x20/0x30 [ 23.826552] kasan_atomics_helper+0x934/0x4858 [ 23.826676] kasan_atomics+0x198/0x2e0 [ 23.826782] kunit_try_run_case+0x170/0x3f0 [ 23.826879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.826981] kthread+0x328/0x630 [ 23.827112] ret_from_fork+0x10/0x20 [ 23.827219] [ 23.827258] Allocated by task 275: [ 23.827318] kasan_save_stack+0x3c/0x68 [ 23.827414] kasan_save_track+0x20/0x40 [ 23.827490] kasan_save_alloc_info+0x40/0x58 [ 23.827554] __kasan_kmalloc+0xd4/0xd8 [ 23.827621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.827691] kasan_atomics+0xb8/0x2e0 [ 23.827752] kunit_try_run_case+0x170/0x3f0 [ 23.827822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.828459] The buggy address is located 0 bytes to the right of [ 23.828459] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.828636] [ 23.828717] The buggy address belongs to the physical page: [ 23.828842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.828987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.829118] page_type: f5(slab) [ 23.829210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.829346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.829441] page dumped because: kasan: bad access detected [ 23.829601] [ 23.829653] Memory state around the buggy address: [ 23.829737] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.829844] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.829952] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.830099] ^ [ 23.830176] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.830295] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.830415] ================================================================== [ 24.240386] ================================================================== [ 24.240856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 24.240933] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.240992] [ 24.241049] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.241154] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.241190] Hardware name: linux,dummy-virt (DT) [ 24.241229] Call trace: [ 24.241261] show_stack+0x20/0x38 (C) [ 24.241321] dump_stack_lvl+0x8c/0xd0 [ 24.241378] print_report+0x118/0x608 [ 24.241433] kasan_report+0xdc/0x128 [ 24.241487] kasan_check_range+0x100/0x1a8 [ 24.241543] __kasan_check_write+0x20/0x30 [ 24.241594] kasan_atomics_helper+0x1644/0x4858 [ 24.241650] kasan_atomics+0x198/0x2e0 [ 24.241702] kunit_try_run_case+0x170/0x3f0 [ 24.241756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.241816] kthread+0x328/0x630 [ 24.241865] ret_from_fork+0x10/0x20 [ 24.241921] [ 24.241947] Allocated by task 275: [ 24.241982] kasan_save_stack+0x3c/0x68 [ 24.244610] kasan_save_track+0x20/0x40 [ 24.244762] kasan_save_alloc_info+0x40/0x58 [ 24.245046] __kasan_kmalloc+0xd4/0xd8 [ 24.245277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.245373] kasan_atomics+0xb8/0x2e0 [ 24.245419] kunit_try_run_case+0x170/0x3f0 [ 24.245509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.245916] kthread+0x328/0x630 [ 24.246063] ret_from_fork+0x10/0x20 [ 24.247008] [ 24.247055] The buggy address belongs to the object at fff00000c63eb100 [ 24.247055] which belongs to the cache kmalloc-64 of size 64 [ 24.247312] The buggy address is located 0 bytes to the right of [ 24.247312] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.247561] [ 24.247759] The buggy address belongs to the physical page: [ 24.248321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.248772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.249373] page_type: f5(slab) [ 24.249672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.250130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.250190] page dumped because: kasan: bad access detected [ 24.250712] [ 24.251050] Memory state around the buggy address: [ 24.251144] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.251200] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.251248] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.251290] ^ [ 24.251329] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.252212] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.252838] ================================================================== [ 23.871287] ================================================================== [ 23.871639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 23.871773] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.872109] [ 23.872208] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.872912] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.873003] Hardware name: linux,dummy-virt (DT) [ 23.873103] Call trace: [ 23.873165] show_stack+0x20/0x38 (C) [ 23.873686] dump_stack_lvl+0x8c/0xd0 [ 23.874189] print_report+0x118/0x608 [ 23.874363] kasan_report+0xdc/0x128 [ 23.874553] __asan_report_load4_noabort+0x20/0x30 [ 23.875116] kasan_atomics_helper+0x3dcc/0x4858 [ 23.875328] kasan_atomics+0x198/0x2e0 [ 23.875485] kunit_try_run_case+0x170/0x3f0 [ 23.875691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.875835] kthread+0x328/0x630 [ 23.875950] ret_from_fork+0x10/0x20 [ 23.876809] [ 23.876917] Allocated by task 275: [ 23.877050] kasan_save_stack+0x3c/0x68 [ 23.877165] kasan_save_track+0x20/0x40 [ 23.877259] kasan_save_alloc_info+0x40/0x58 [ 23.877363] __kasan_kmalloc+0xd4/0xd8 [ 23.878000] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.878347] kasan_atomics+0xb8/0x2e0 [ 23.878470] kunit_try_run_case+0x170/0x3f0 [ 23.878824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.878961] kthread+0x328/0x630 [ 23.879071] ret_from_fork+0x10/0x20 [ 23.879521] [ 23.879696] The buggy address belongs to the object at fff00000c63eb100 [ 23.879696] which belongs to the cache kmalloc-64 of size 64 [ 23.880257] The buggy address is located 0 bytes to the right of [ 23.880257] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.880635] [ 23.880730] The buggy address belongs to the physical page: [ 23.880823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.880969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.881118] page_type: f5(slab) [ 23.881854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.882060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.882386] page dumped because: kasan: bad access detected [ 23.882478] [ 23.882710] Memory state around the buggy address: [ 23.882801] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.883388] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.883547] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.883727] ^ [ 23.883814] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.884359] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.884485] ================================================================== [ 24.178660] ================================================================== [ 24.178865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 24.179009] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.179137] [ 24.179254] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.179459] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.179531] Hardware name: linux,dummy-virt (DT) [ 24.179598] Call trace: [ 24.179643] show_stack+0x20/0x38 (C) [ 24.179745] dump_stack_lvl+0x8c/0xd0 [ 24.179855] print_report+0x118/0x608 [ 24.179972] kasan_report+0xdc/0x128 [ 24.180111] __asan_report_load8_noabort+0x20/0x30 [ 24.180275] kasan_atomics_helper+0x3f04/0x4858 [ 24.180437] kasan_atomics+0x198/0x2e0 [ 24.180569] kunit_try_run_case+0x170/0x3f0 [ 24.180694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.180831] kthread+0x328/0x630 [ 24.180943] ret_from_fork+0x10/0x20 [ 24.181077] [ 24.181127] Allocated by task 275: [ 24.181201] kasan_save_stack+0x3c/0x68 [ 24.181303] kasan_save_track+0x20/0x40 [ 24.181399] kasan_save_alloc_info+0x40/0x58 [ 24.181498] __kasan_kmalloc+0xd4/0xd8 [ 24.181589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.181686] kasan_atomics+0xb8/0x2e0 [ 24.181774] kunit_try_run_case+0x170/0x3f0 [ 24.181867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.181975] kthread+0x328/0x630 [ 24.182089] ret_from_fork+0x10/0x20 [ 24.182181] [ 24.182269] The buggy address belongs to the object at fff00000c63eb100 [ 24.182269] which belongs to the cache kmalloc-64 of size 64 [ 24.182410] The buggy address is located 0 bytes to the right of [ 24.182410] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.182583] [ 24.182653] The buggy address belongs to the physical page: [ 24.182751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.182894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.183057] page_type: f5(slab) [ 24.183152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.183282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.183386] page dumped because: kasan: bad access detected [ 24.183465] [ 24.183511] Memory state around the buggy address: [ 24.183587] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.183694] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.183798] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.183903] ^ [ 24.184027] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.184128] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.184247] ================================================================== [ 23.788348] ================================================================== [ 23.788718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 23.788873] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.789501] Hardware name: linux,dummy-virt (DT) [ 23.790327] dump_stack_lvl+0x8c/0xd0 [ 23.790444] print_report+0x118/0x608 [ 23.790544] kasan_report+0xdc/0x128 [ 23.790982] kasan_atomics_helper+0x760/0x4858 [ 23.791114] kasan_atomics+0x198/0x2e0 [ 23.791331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.791468] kthread+0x328/0x630 [ 23.792015] [ 23.792079] Allocated by task 275: [ 23.792427] kasan_save_alloc_info+0x40/0x58 [ 23.792821] kunit_try_run_case+0x170/0x3f0 [ 23.792921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.793417] The buggy address is located 0 bytes to the right of [ 23.793417] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.794585] page_type: f5(slab) [ 23.794894] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.795222] ================================================================== [ 23.885736] ================================================================== [ 23.885885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 23.886501] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.886649] [ 23.886722] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.886950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.887263] Hardware name: linux,dummy-virt (DT) [ 23.887504] Call trace: [ 23.887649] show_stack+0x20/0x38 (C) [ 23.888201] dump_stack_lvl+0x8c/0xd0 [ 23.888578] print_report+0x118/0x608 [ 23.889117] kasan_report+0xdc/0x128 [ 23.889333] kasan_check_range+0x100/0x1a8 [ 23.889468] __kasan_check_write+0x20/0x30 [ 23.889784] kasan_atomics_helper+0xb70/0x4858 [ 23.890198] kasan_atomics+0x198/0x2e0 [ 23.890489] kunit_try_run_case+0x170/0x3f0 [ 23.890627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.890756] kthread+0x328/0x630 [ 23.890861] ret_from_fork+0x10/0x20 [ 23.891357] [ 23.891441] Allocated by task 275: [ 23.891866] kasan_save_stack+0x3c/0x68 [ 23.892003] kasan_save_track+0x20/0x40 [ 23.892114] kasan_save_alloc_info+0x40/0x58 [ 23.892468] __kasan_kmalloc+0xd4/0xd8 [ 23.892670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.892789] kasan_atomics+0xb8/0x2e0 [ 23.893141] kunit_try_run_case+0x170/0x3f0 [ 23.893284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.893642] kthread+0x328/0x630 [ 23.894183] ret_from_fork+0x10/0x20 [ 23.894321] [ 23.894375] The buggy address belongs to the object at fff00000c63eb100 [ 23.894375] which belongs to the cache kmalloc-64 of size 64 [ 23.894504] The buggy address is located 0 bytes to the right of [ 23.894504] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.894656] [ 23.894714] The buggy address belongs to the physical page: [ 23.894810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.894940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.896038] page_type: f5(slab) [ 23.896590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.897224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.897339] page dumped because: kasan: bad access detected [ 23.897429] [ 23.897844] Memory state around the buggy address: [ 23.897946] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.901544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 23.908518] ret_from_fork+0x10/0x20 [ 23.911463] page_type: f5(slab) [ 23.912377] [ 23.912576] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.912733] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.913074] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.913417] ^ [ 23.913868] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.916069] [ 23.916704] Hardware name: linux,dummy-virt (DT) [ 23.918877] __kasan_check_write+0x20/0x30 [ 23.920551] kthread+0x328/0x630 [ 23.922769] kasan_atomics+0xb8/0x2e0 [ 23.924860] [ 23.926836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.927618] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.927934] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.928271] ^ [ 23.928923] ================================================================== [ 24.279157] ================================================================== [ 24.279226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 24.279294] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.279353] [ 24.279396] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.279498] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.279536] Hardware name: linux,dummy-virt (DT) [ 24.279575] Call trace: [ 24.279604] show_stack+0x20/0x38 (C) [ 24.279665] dump_stack_lvl+0x8c/0xd0 [ 24.279722] print_report+0x118/0x608 [ 24.279777] kasan_report+0xdc/0x128 [ 24.279832] __asan_report_load8_noabort+0x20/0x30 [ 24.279895] kasan_atomics_helper+0x3e10/0x4858 [ 24.279951] kasan_atomics+0x198/0x2e0 [ 24.280005] kunit_try_run_case+0x170/0x3f0 [ 24.280079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.280141] kthread+0x328/0x630 [ 24.280191] ret_from_fork+0x10/0x20 [ 24.283218] [ 24.283572] Allocated by task 275: [ 24.283622] kasan_save_stack+0x3c/0x68 [ 24.284440] kasan_save_track+0x20/0x40 [ 24.284947] kasan_save_alloc_info+0x40/0x58 [ 24.285221] __kasan_kmalloc+0xd4/0xd8 [ 24.285992] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.286215] kasan_atomics+0xb8/0x2e0 [ 24.286374] kunit_try_run_case+0x170/0x3f0 [ 24.286474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.286522] kthread+0x328/0x630 [ 24.286559] ret_from_fork+0x10/0x20 [ 24.286597] [ 24.286624] The buggy address belongs to the object at fff00000c63eb100 [ 24.286624] which belongs to the cache kmalloc-64 of size 64 [ 24.287848] The buggy address is located 0 bytes to the right of [ 24.287848] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.287937] [ 24.287965] The buggy address belongs to the physical page: [ 24.288654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.288750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.288824] page_type: f5(slab) [ 24.288876] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.289659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.289889] page dumped because: kasan: bad access detected [ 24.290484] [ 24.290604] Memory state around the buggy address: [ 24.290657] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.290713] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.290763] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.290807] ^ [ 24.290846] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.290892] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.290933] ================================================================== [ 24.292574] ================================================================== [ 24.293327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 24.294093] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.294247] [ 24.294444] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.294840] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.294876] Hardware name: linux,dummy-virt (DT) [ 24.294914] Call trace: [ 24.294944] show_stack+0x20/0x38 (C) [ 24.295009] dump_stack_lvl+0x8c/0xd0 [ 24.295081] print_report+0x118/0x608 [ 24.296428] kasan_report+0xdc/0x128 [ 24.296696] kasan_check_range+0x100/0x1a8 [ 24.296762] __kasan_check_write+0x20/0x30 [ 24.296818] kasan_atomics_helper+0x175c/0x4858 [ 24.296875] kasan_atomics+0x198/0x2e0 [ 24.298262] kunit_try_run_case+0x170/0x3f0 [ 24.298323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.298382] kthread+0x328/0x630 [ 24.299231] ret_from_fork+0x10/0x20 [ 24.299316] [ 24.299345] Allocated by task 275: [ 24.299714] kasan_save_stack+0x3c/0x68 [ 24.299907] kasan_save_track+0x20/0x40 [ 24.300113] kasan_save_alloc_info+0x40/0x58 [ 24.300307] __kasan_kmalloc+0xd4/0xd8 [ 24.300520] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.300587] kasan_atomics+0xb8/0x2e0 [ 24.300634] kunit_try_run_case+0x170/0x3f0 [ 24.301491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.301625] kthread+0x328/0x630 [ 24.301770] ret_from_fork+0x10/0x20 [ 24.302166] [ 24.302199] The buggy address belongs to the object at fff00000c63eb100 [ 24.302199] which belongs to the cache kmalloc-64 of size 64 [ 24.302269] The buggy address is located 0 bytes to the right of [ 24.302269] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.302659] [ 24.302760] The buggy address belongs to the physical page: [ 24.303043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.303567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.303755] page_type: f5(slab) [ 24.303811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.303871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.303917] page dumped because: kasan: bad access detected [ 24.303956] [ 24.303978] Memory state around the buggy address: [ 24.304029] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.304089] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.304140] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.304186] ^ [ 24.304228] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.304278] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.304379] ================================================================== [ 24.109346] ================================================================== [ 24.110059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 24.111013] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.111322] [ 24.111635] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.112758] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.112843] Hardware name: linux,dummy-virt (DT) [ 24.113423] Call trace: [ 24.113622] show_stack+0x20/0x38 (C) [ 24.114244] dump_stack_lvl+0x8c/0xd0 [ 24.114699] print_report+0x118/0x608 [ 24.114992] kasan_report+0xdc/0x128 [ 24.115638] kasan_check_range+0x100/0x1a8 [ 24.116001] __kasan_check_write+0x20/0x30 [ 24.116970] kasan_atomics_helper+0x10c0/0x4858 [ 24.117561] kasan_atomics+0x198/0x2e0 [ 24.117724] kunit_try_run_case+0x170/0x3f0 [ 24.117889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.118089] kthread+0x328/0x630 [ 24.118190] ret_from_fork+0x10/0x20 [ 24.118420] [ 24.118593] Allocated by task 275: [ 24.118733] kasan_save_stack+0x3c/0x68 [ 24.118842] kasan_save_track+0x20/0x40 [ 24.118927] kasan_save_alloc_info+0x40/0x58 [ 24.119008] __kasan_kmalloc+0xd4/0xd8 [ 24.119289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.119388] kasan_atomics+0xb8/0x2e0 [ 24.119476] kunit_try_run_case+0x170/0x3f0 [ 24.119832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.120003] kthread+0x328/0x630 [ 24.120099] ret_from_fork+0x10/0x20 [ 24.120407] [ 24.120502] The buggy address belongs to the object at fff00000c63eb100 [ 24.120502] which belongs to the cache kmalloc-64 of size 64 [ 24.120702] The buggy address is located 0 bytes to the right of [ 24.120702] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.120901] [ 24.120976] The buggy address belongs to the physical page: [ 24.121078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.121229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.121518] page_type: f5(slab) [ 24.121629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.121757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.121861] page dumped because: kasan: bad access detected [ 24.121952] [ 24.122029] Memory state around the buggy address: [ 24.122146] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.122295] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.122437] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.122570] ^ [ 24.122683] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.122823] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.122925] ================================================================== [ 24.254313] ================================================================== [ 24.254514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 24.255301] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.255488] [ 24.255582] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.256039] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.256189] Hardware name: linux,dummy-virt (DT) [ 24.256324] Call trace: [ 24.256447] show_stack+0x20/0x38 (C) [ 24.256555] dump_stack_lvl+0x8c/0xd0 [ 24.256944] print_report+0x118/0x608 [ 24.257008] kasan_report+0xdc/0x128 [ 24.257082] __asan_report_load8_noabort+0x20/0x30 [ 24.257261] kasan_atomics_helper+0x3df4/0x4858 [ 24.257331] kasan_atomics+0x198/0x2e0 [ 24.257434] kunit_try_run_case+0x170/0x3f0 [ 24.257494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.257557] kthread+0x328/0x630 [ 24.257606] ret_from_fork+0x10/0x20 [ 24.257665] [ 24.257924] Allocated by task 275: [ 24.258114] kasan_save_stack+0x3c/0x68 [ 24.258319] kasan_save_track+0x20/0x40 [ 24.258371] kasan_save_alloc_info+0x40/0x58 [ 24.258814] __kasan_kmalloc+0xd4/0xd8 [ 24.258865] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.259318] kasan_atomics+0xb8/0x2e0 [ 24.259816] kunit_try_run_case+0x170/0x3f0 [ 24.259878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.259931] kthread+0x328/0x630 [ 24.259969] ret_from_fork+0x10/0x20 [ 24.260662] [ 24.260981] The buggy address belongs to the object at fff00000c63eb100 [ 24.260981] which belongs to the cache kmalloc-64 of size 64 [ 24.261440] The buggy address is located 0 bytes to the right of [ 24.261440] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.261815] [ 24.262011] The buggy address belongs to the physical page: [ 24.262167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.262256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.262318] page_type: f5(slab) [ 24.262366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.262426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.262473] page dumped because: kasan: bad access detected [ 24.262511] [ 24.262534] Memory state around the buggy address: [ 24.262574] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.262625] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.262675] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.264697] ^ [ 24.264898] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.264955] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.265003] ================================================================== [ 23.962843] ================================================================== [ 23.963652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 23.963821] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.963957] [ 23.964068] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.964293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.964378] Hardware name: linux,dummy-virt (DT) [ 23.964466] Call trace: [ 23.964541] show_stack+0x20/0x38 (C) [ 23.964680] dump_stack_lvl+0x8c/0xd0 [ 23.964811] print_report+0x118/0x608 [ 23.964940] kasan_report+0xdc/0x128 [ 23.965079] __asan_report_load4_noabort+0x20/0x30 [ 23.967145] kasan_atomics_helper+0x3dd8/0x4858 [ 23.967408] kasan_atomics+0x198/0x2e0 [ 23.967986] kunit_try_run_case+0x170/0x3f0 [ 23.968217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.968786] kthread+0x328/0x630 [ 23.968931] ret_from_fork+0x10/0x20 [ 23.969070] [ 23.969326] Allocated by task 275: [ 23.969452] kasan_save_stack+0x3c/0x68 [ 23.970082] kasan_save_track+0x20/0x40 [ 23.970203] kasan_save_alloc_info+0x40/0x58 [ 23.970680] __kasan_kmalloc+0xd4/0xd8 [ 23.970800] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.970907] kasan_atomics+0xb8/0x2e0 [ 23.971512] kunit_try_run_case+0x170/0x3f0 [ 23.971871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.972224] kthread+0x328/0x630 [ 23.972373] ret_from_fork+0x10/0x20 [ 23.972465] [ 23.972514] The buggy address belongs to the object at fff00000c63eb100 [ 23.972514] which belongs to the cache kmalloc-64 of size 64 [ 23.972939] The buggy address is located 0 bytes to the right of [ 23.972939] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.973588] [ 23.973676] The buggy address belongs to the physical page: [ 23.974049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.974300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.974434] page_type: f5(slab) [ 23.974529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.974910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.975476] page dumped because: kasan: bad access detected [ 23.975573] [ 23.975678] Memory state around the buggy address: [ 23.975780] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.976462] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.976607] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.976716] ^ [ 23.977048] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.977568] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.978070] ================================================================== [ 24.199140] ================================================================== [ 24.199309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 24.199479] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.199648] [ 24.199756] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.200069] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.200185] Hardware name: linux,dummy-virt (DT) [ 24.200293] Call trace: [ 24.200359] show_stack+0x20/0x38 (C) [ 24.200462] dump_stack_lvl+0x8c/0xd0 [ 24.200566] print_report+0x118/0x608 [ 24.200655] kasan_report+0xdc/0x128 [ 24.200739] kasan_check_range+0x100/0x1a8 [ 24.200855] __kasan_check_write+0x20/0x30 [ 24.200979] kasan_atomics_helper+0x14e4/0x4858 [ 24.201107] kasan_atomics+0x198/0x2e0 [ 24.201213] kunit_try_run_case+0x170/0x3f0 [ 24.201376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.201507] kthread+0x328/0x630 [ 24.201602] ret_from_fork+0x10/0x20 [ 24.201738] [ 24.201792] Allocated by task 275: [ 24.201890] kasan_save_stack+0x3c/0x68 [ 24.201993] kasan_save_track+0x20/0x40 [ 24.202111] kasan_save_alloc_info+0x40/0x58 [ 24.202266] __kasan_kmalloc+0xd4/0xd8 [ 24.203422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.204111] kasan_atomics+0xb8/0x2e0 [ 24.204218] kunit_try_run_case+0x170/0x3f0 [ 24.204855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.205383] kthread+0x328/0x630 [ 24.205467] ret_from_fork+0x10/0x20 [ 24.205738] [ 24.205907] The buggy address belongs to the object at fff00000c63eb100 [ 24.205907] which belongs to the cache kmalloc-64 of size 64 [ 24.206336] The buggy address is located 0 bytes to the right of [ 24.206336] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.206491] [ 24.206545] The buggy address belongs to the physical page: [ 24.206652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.206829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.206964] page_type: f5(slab) [ 24.207064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.207187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.207288] page dumped because: kasan: bad access detected [ 24.207369] [ 24.207436] Memory state around the buggy address: [ 24.207518] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.207630] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.207741] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.207819] ^ [ 24.208471] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.208641] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.208766] ================================================================== [ 24.171968] ================================================================== [ 24.172138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 24.172289] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.172414] [ 24.172503] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.172734] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.172801] Hardware name: linux,dummy-virt (DT) [ 24.172869] Call trace: [ 24.172927] show_stack+0x20/0x38 (C) [ 24.173058] dump_stack_lvl+0x8c/0xd0 [ 24.173182] print_report+0x118/0x608 [ 24.173309] kasan_report+0xdc/0x128 [ 24.173429] kasan_check_range+0x100/0x1a8 [ 24.173555] __kasan_check_write+0x20/0x30 [ 24.173675] kasan_atomics_helper+0x1384/0x4858 [ 24.173800] kasan_atomics+0x198/0x2e0 [ 24.173919] kunit_try_run_case+0x170/0x3f0 [ 24.174061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.174210] kthread+0x328/0x630 [ 24.174367] ret_from_fork+0x10/0x20 [ 24.174494] [ 24.174576] Allocated by task 275: [ 24.174671] kasan_save_stack+0x3c/0x68 [ 24.174811] kasan_save_track+0x20/0x40 [ 24.174943] kasan_save_alloc_info+0x40/0x58 [ 24.175099] __kasan_kmalloc+0xd4/0xd8 [ 24.175236] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.175370] kasan_atomics+0xb8/0x2e0 [ 24.175496] kunit_try_run_case+0x170/0x3f0 [ 24.175621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.175733] kthread+0x328/0x630 [ 24.175812] ret_from_fork+0x10/0x20 [ 24.175897] [ 24.175942] The buggy address belongs to the object at fff00000c63eb100 [ 24.175942] which belongs to the cache kmalloc-64 of size 64 [ 24.176079] The buggy address is located 0 bytes to the right of [ 24.176079] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.176243] [ 24.176296] The buggy address belongs to the physical page: [ 24.176381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.176539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.176725] page_type: f5(slab) [ 24.176823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.177005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.177115] page dumped because: kasan: bad access detected [ 24.177217] [ 24.177267] Memory state around the buggy address: [ 24.177373] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.177491] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.177589] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.177683] ^ [ 24.177776] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.177896] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.177992] ================================================================== [ 24.317777] ================================================================== [ 24.317851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 24.317921] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.317979] [ 24.318033] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.320181] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.320238] Hardware name: linux,dummy-virt (DT) [ 24.320280] Call trace: [ 24.320314] show_stack+0x20/0x38 (C) [ 24.320382] dump_stack_lvl+0x8c/0xd0 [ 24.320445] print_report+0x118/0x608 [ 24.320503] kasan_report+0xdc/0x128 [ 24.320572] kasan_check_range+0x100/0x1a8 [ 24.320634] __kasan_check_write+0x20/0x30 [ 24.321522] kasan_atomics_helper+0x17ec/0x4858 [ 24.321989] kasan_atomics+0x198/0x2e0 [ 24.322860] kunit_try_run_case+0x170/0x3f0 [ 24.322972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.323052] kthread+0x328/0x630 [ 24.323109] ret_from_fork+0x10/0x20 [ 24.323169] [ 24.324074] Allocated by task 275: [ 24.324140] kasan_save_stack+0x3c/0x68 [ 24.324202] kasan_save_track+0x20/0x40 [ 24.324248] kasan_save_alloc_info+0x40/0x58 [ 24.324297] __kasan_kmalloc+0xd4/0xd8 [ 24.324340] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.324385] kasan_atomics+0xb8/0x2e0 [ 24.325693] kunit_try_run_case+0x170/0x3f0 [ 24.326075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.326502] kthread+0x328/0x630 [ 24.326633] ret_from_fork+0x10/0x20 [ 24.326694] [ 24.327153] The buggy address belongs to the object at fff00000c63eb100 [ 24.327153] which belongs to the cache kmalloc-64 of size 64 [ 24.327512] The buggy address is located 0 bytes to the right of [ 24.327512] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.327656] [ 24.327685] The buggy address belongs to the physical page: [ 24.327721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.327779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.327834] page_type: f5(slab) [ 24.327881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.329181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.329256] page dumped because: kasan: bad access detected [ 24.329299] [ 24.329323] Memory state around the buggy address: [ 24.329365] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.330388] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.330513] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.330563] ^ [ 24.330605] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.330953] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.331216] ================================================================== [ 24.267062] ================================================================== [ 24.267139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 24.267211] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.268554] [ 24.268761] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.269057] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.269098] Hardware name: linux,dummy-virt (DT) [ 24.269137] Call trace: [ 24.269168] show_stack+0x20/0x38 (C) [ 24.269236] dump_stack_lvl+0x8c/0xd0 [ 24.269295] print_report+0x118/0x608 [ 24.269350] kasan_report+0xdc/0x128 [ 24.269404] kasan_check_range+0x100/0x1a8 [ 24.269461] __kasan_check_write+0x20/0x30 [ 24.269514] kasan_atomics_helper+0x16d0/0x4858 [ 24.269570] kasan_atomics+0x198/0x2e0 [ 24.269620] kunit_try_run_case+0x170/0x3f0 [ 24.269677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.269735] kthread+0x328/0x630 [ 24.269783] ret_from_fork+0x10/0x20 [ 24.269840] [ 24.269865] Allocated by task 275: [ 24.269900] kasan_save_stack+0x3c/0x68 [ 24.269950] kasan_save_track+0x20/0x40 [ 24.270008] kasan_save_alloc_info+0x40/0x58 [ 24.273391] __kasan_kmalloc+0xd4/0xd8 [ 24.273496] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.273556] kasan_atomics+0xb8/0x2e0 [ 24.274063] kunit_try_run_case+0x170/0x3f0 [ 24.274366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.274455] kthread+0x328/0x630 [ 24.274495] ret_from_fork+0x10/0x20 [ 24.274539] [ 24.274569] The buggy address belongs to the object at fff00000c63eb100 [ 24.274569] which belongs to the cache kmalloc-64 of size 64 [ 24.275237] The buggy address is located 0 bytes to the right of [ 24.275237] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.275359] [ 24.275387] The buggy address belongs to the physical page: [ 24.275425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.275483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.275540] page_type: f5(slab) [ 24.275587] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.275645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.275692] page dumped because: kasan: bad access detected [ 24.275730] [ 24.275752] Memory state around the buggy address: [ 24.277153] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.277374] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.277670] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.277918] ^ [ 24.277966] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.278026] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.278538] ================================================================== [ 24.307182] ================================================================== [ 24.307259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 24.307328] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.307383] [ 24.307428] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.307525] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.307557] Hardware name: linux,dummy-virt (DT) [ 24.307595] Call trace: [ 24.307622] show_stack+0x20/0x38 (C) [ 24.307680] dump_stack_lvl+0x8c/0xd0 [ 24.307734] print_report+0x118/0x608 [ 24.307786] kasan_report+0xdc/0x128 [ 24.307837] __asan_report_load8_noabort+0x20/0x30 [ 24.307893] kasan_atomics_helper+0x3e20/0x4858 [ 24.307946] kasan_atomics+0x198/0x2e0 [ 24.307999] kunit_try_run_case+0x170/0x3f0 [ 24.308074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.308137] kthread+0x328/0x630 [ 24.308187] ret_from_fork+0x10/0x20 [ 24.308244] [ 24.308267] Allocated by task 275: [ 24.308302] kasan_save_stack+0x3c/0x68 [ 24.308353] kasan_save_track+0x20/0x40 [ 24.308398] kasan_save_alloc_info+0x40/0x58 [ 24.308446] __kasan_kmalloc+0xd4/0xd8 [ 24.308489] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.308544] kasan_atomics+0xb8/0x2e0 [ 24.308593] kunit_try_run_case+0x170/0x3f0 [ 24.308637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.308688] kthread+0x328/0x630 [ 24.308726] ret_from_fork+0x10/0x20 [ 24.308768] [ 24.308793] The buggy address belongs to the object at fff00000c63eb100 [ 24.308793] which belongs to the cache kmalloc-64 of size 64 [ 24.308862] The buggy address is located 0 bytes to the right of [ 24.308862] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.308933] [ 24.308958] The buggy address belongs to the physical page: [ 24.308992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.314004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.314432] page_type: f5(slab) [ 24.314746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.314807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.314855] page dumped because: kasan: bad access detected [ 24.314893] [ 24.314914] Memory state around the buggy address: [ 24.314952] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.315001] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.315068] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.315967] ^ [ 24.316094] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.316254] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.316300] ================================================================== [ 23.750966] ================================================================== [ 23.751104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 23.751479] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.752313] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.753591] dump_stack_lvl+0x8c/0xd0 [ 23.754703] kasan_atomics+0x198/0x2e0 [ 23.756292] [ 23.756495] kasan_save_track+0x20/0x40 [ 23.756911] kasan_atomics+0xb8/0x2e0 [ 23.757114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.757313] ret_from_fork+0x10/0x20 [ 23.759077] The buggy address is located 0 bytes to the right of [ 23.759077] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.762695] ^ [ 23.762869] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.763176] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.765377] ================================================================== [ 24.134955] ================================================================== [ 24.135074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 24.135187] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.135308] [ 24.135436] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.135691] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.135802] Hardware name: linux,dummy-virt (DT) [ 24.136005] Call trace: [ 24.136262] show_stack+0x20/0x38 (C) [ 24.136626] dump_stack_lvl+0x8c/0xd0 [ 24.136793] print_report+0x118/0x608 [ 24.136946] kasan_report+0xdc/0x128 [ 24.137112] kasan_check_range+0x100/0x1a8 [ 24.137278] __kasan_check_write+0x20/0x30 [ 24.137394] kasan_atomics_helper+0x1190/0x4858 [ 24.137513] kasan_atomics+0x198/0x2e0 [ 24.137728] kunit_try_run_case+0x170/0x3f0 [ 24.138007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.138314] kthread+0x328/0x630 [ 24.138430] ret_from_fork+0x10/0x20 [ 24.138545] [ 24.138595] Allocated by task 275: [ 24.138670] kasan_save_stack+0x3c/0x68 [ 24.138779] kasan_save_track+0x20/0x40 [ 24.138874] kasan_save_alloc_info+0x40/0x58 [ 24.138962] __kasan_kmalloc+0xd4/0xd8 [ 24.139051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.139142] kasan_atomics+0xb8/0x2e0 [ 24.139226] kunit_try_run_case+0x170/0x3f0 [ 24.139318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.139431] kthread+0x328/0x630 [ 24.139512] ret_from_fork+0x10/0x20 [ 24.139599] [ 24.139654] The buggy address belongs to the object at fff00000c63eb100 [ 24.139654] which belongs to the cache kmalloc-64 of size 64 [ 24.139793] The buggy address is located 0 bytes to the right of [ 24.139793] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.139952] [ 24.140011] The buggy address belongs to the physical page: [ 24.140360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.140959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.141146] page_type: f5(slab) [ 24.141256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.141675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.141818] page dumped because: kasan: bad access detected [ 24.141904] [ 24.141952] Memory state around the buggy address: [ 24.142046] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.142156] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.142267] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.142369] ^ [ 24.142452] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.142546] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.142646] ================================================================== [ 23.992947] ================================================================== [ 23.993064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 23.993185] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.993300] [ 23.993382] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.993590] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.993665] Hardware name: linux,dummy-virt (DT) [ 23.993743] Call trace: [ 23.993797] show_stack+0x20/0x38 (C) [ 23.993912] dump_stack_lvl+0x8c/0xd0 [ 23.994027] print_report+0x118/0x608 [ 23.994172] kasan_report+0xdc/0x128 [ 23.994276] __asan_report_load4_noabort+0x20/0x30 [ 23.994722] kasan_atomics_helper+0x3e04/0x4858 [ 23.994878] kasan_atomics+0x198/0x2e0 [ 23.994980] kunit_try_run_case+0x170/0x3f0 [ 23.995104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.995238] kthread+0x328/0x630 [ 23.995373] ret_from_fork+0x10/0x20 [ 23.995515] [ 23.995577] Allocated by task 275: [ 23.995681] kasan_save_stack+0x3c/0x68 [ 23.995787] kasan_save_track+0x20/0x40 [ 23.995910] kasan_save_alloc_info+0x40/0x58 [ 23.996047] __kasan_kmalloc+0xd4/0xd8 [ 23.996135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.996239] kasan_atomics+0xb8/0x2e0 [ 23.996327] kunit_try_run_case+0x170/0x3f0 [ 23.996417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.996576] kthread+0x328/0x630 [ 23.996708] ret_from_fork+0x10/0x20 [ 23.996826] [ 23.996897] The buggy address belongs to the object at fff00000c63eb100 [ 23.996897] which belongs to the cache kmalloc-64 of size 64 [ 23.997106] The buggy address is located 0 bytes to the right of [ 23.997106] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.997531] [ 23.997632] The buggy address belongs to the physical page: [ 23.997958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.998148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.998300] page_type: f5(slab) [ 23.998399] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.998537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.998680] page dumped because: kasan: bad access detected [ 23.998782] [ 23.998826] Memory state around the buggy address: [ 23.998919] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.999037] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.999148] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.999254] ^ [ 23.999349] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.999435] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.999534] ================================================================== [ 24.028947] ================================================================== [ 24.029136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 24.029260] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.029609] [ 24.029838] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.030600] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.030977] Hardware name: linux,dummy-virt (DT) [ 24.031342] Call trace: [ 24.031537] show_stack+0x20/0x38 (C) [ 24.031892] dump_stack_lvl+0x8c/0xd0 [ 24.032418] print_report+0x118/0x608 [ 24.032827] kasan_report+0xdc/0x128 [ 24.033290] __asan_report_store8_noabort+0x20/0x30 [ 24.033684] kasan_atomics_helper+0x3e5c/0x4858 [ 24.034268] kasan_atomics+0x198/0x2e0 [ 24.034567] kunit_try_run_case+0x170/0x3f0 [ 24.034784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.035416] kthread+0x328/0x630 [ 24.035603] ret_from_fork+0x10/0x20 [ 24.036250] [ 24.036409] Allocated by task 275: [ 24.036706] kasan_save_stack+0x3c/0x68 [ 24.037216] kasan_save_track+0x20/0x40 [ 24.037511] kasan_save_alloc_info+0x40/0x58 [ 24.038084] __kasan_kmalloc+0xd4/0xd8 [ 24.038415] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.038850] kasan_atomics+0xb8/0x2e0 [ 24.039056] kunit_try_run_case+0x170/0x3f0 [ 24.039169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.039279] kthread+0x328/0x630 [ 24.039364] ret_from_fork+0x10/0x20 [ 24.039461] [ 24.040231] The buggy address belongs to the object at fff00000c63eb100 [ 24.040231] which belongs to the cache kmalloc-64 of size 64 [ 24.041318] The buggy address is located 0 bytes to the right of [ 24.041318] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.041710] [ 24.041783] The buggy address belongs to the physical page: [ 24.041955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.042296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.042437] page_type: f5(slab) [ 24.042842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.043298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.043813] page dumped because: kasan: bad access detected [ 24.043921] [ 24.044095] Memory state around the buggy address: [ 24.044194] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.044789] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.044922] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.045110] ^ [ 24.045237] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.045349] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.045677] ================================================================== [ 24.056578] ================================================================== [ 24.056701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 24.056819] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.056945] [ 24.057040] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.057269] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.057348] Hardware name: linux,dummy-virt (DT) [ 24.057436] Call trace: [ 24.057496] show_stack+0x20/0x38 (C) [ 24.057620] dump_stack_lvl+0x8c/0xd0 [ 24.057742] print_report+0x118/0x608 [ 24.057864] kasan_report+0xdc/0x128 [ 24.057977] kasan_check_range+0x100/0x1a8 [ 24.059587] __kasan_check_write+0x20/0x30 [ 24.059800] kasan_atomics_helper+0xf20/0x4858 [ 24.060137] kasan_atomics+0x198/0x2e0 [ 24.060341] kunit_try_run_case+0x170/0x3f0 [ 24.060474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.060626] kthread+0x328/0x630 [ 24.060736] ret_from_fork+0x10/0x20 [ 24.060915] [ 24.061007] Allocated by task 275: [ 24.061166] kasan_save_stack+0x3c/0x68 [ 24.061550] kasan_save_track+0x20/0x40 [ 24.061678] kasan_save_alloc_info+0x40/0x58 [ 24.061879] __kasan_kmalloc+0xd4/0xd8 [ 24.062172] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.062296] kasan_atomics+0xb8/0x2e0 [ 24.062433] kunit_try_run_case+0x170/0x3f0 [ 24.062774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.062927] kthread+0x328/0x630 [ 24.063075] ret_from_fork+0x10/0x20 [ 24.063201] [ 24.063288] The buggy address belongs to the object at fff00000c63eb100 [ 24.063288] which belongs to the cache kmalloc-64 of size 64 [ 24.063638] The buggy address is located 0 bytes to the right of [ 24.063638] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.063828] [ 24.063882] The buggy address belongs to the physical page: [ 24.063924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.063990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.064099] page_type: f5(slab) [ 24.064200] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.064368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.064622] page dumped because: kasan: bad access detected [ 24.064713] [ 24.064775] Memory state around the buggy address: [ 24.064864] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.065278] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.065420] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.065567] ^ [ 24.065651] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.065751] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.066146] ================================================================== [ 23.858731] ================================================================== [ 23.859107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 23.859488] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.859624] [ 23.859706] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.859915] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.859997] Hardware name: linux,dummy-virt (DT) [ 23.860089] Call trace: [ 23.860150] show_stack+0x20/0x38 (C) [ 23.860272] dump_stack_lvl+0x8c/0xd0 [ 23.860398] print_report+0x118/0x608 [ 23.860520] kasan_report+0xdc/0x128 [ 23.860660] kasan_check_range+0x100/0x1a8 [ 23.860788] __kasan_check_write+0x20/0x30 [ 23.860908] kasan_atomics_helper+0xad4/0x4858 [ 23.862793] kasan_atomics+0x198/0x2e0 [ 23.863764] kunit_try_run_case+0x170/0x3f0 [ 23.863996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.864164] kthread+0x328/0x630 [ 23.864269] ret_from_fork+0x10/0x20 [ 23.864407] [ 23.864456] Allocated by task 275: [ 23.864524] kasan_save_stack+0x3c/0x68 [ 23.864644] kasan_save_track+0x20/0x40 [ 23.864747] kasan_save_alloc_info+0x40/0x58 [ 23.864874] __kasan_kmalloc+0xd4/0xd8 [ 23.864988] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.865111] kasan_atomics+0xb8/0x2e0 [ 23.865223] kunit_try_run_case+0x170/0x3f0 [ 23.865328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.865441] kthread+0x328/0x630 [ 23.865525] ret_from_fork+0x10/0x20 [ 23.865618] [ 23.865682] The buggy address belongs to the object at fff00000c63eb100 [ 23.865682] which belongs to the cache kmalloc-64 of size 64 [ 23.865824] The buggy address is located 0 bytes to the right of [ 23.865824] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.865974] [ 23.866222] The buggy address belongs to the physical page: [ 23.866478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.867099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.867532] page_type: f5(slab) [ 23.867636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.868071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.868364] page dumped because: kasan: bad access detected [ 23.868606] [ 23.868668] Memory state around the buggy address: [ 23.868761] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.869196] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.869380] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.869475] ^ [ 23.869933] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.870102] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.870376] ================================================================== [ 24.165101] ================================================================== [ 24.165218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 24.165339] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.165464] [ 24.165556] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.165783] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.165861] Hardware name: linux,dummy-virt (DT) [ 24.165943] Call trace: [ 24.166006] show_stack+0x20/0x38 (C) [ 24.166139] dump_stack_lvl+0x8c/0xd0 [ 24.166251] print_report+0x118/0x608 [ 24.166414] kasan_report+0xdc/0x128 [ 24.166545] kasan_check_range+0x100/0x1a8 [ 24.166676] __kasan_check_write+0x20/0x30 [ 24.166805] kasan_atomics_helper+0x12d8/0x4858 [ 24.166961] kasan_atomics+0x198/0x2e0 [ 24.167175] kunit_try_run_case+0x170/0x3f0 [ 24.167307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.167459] kthread+0x328/0x630 [ 24.167560] ret_from_fork+0x10/0x20 [ 24.167709] [ 24.167776] Allocated by task 275: [ 24.167848] kasan_save_stack+0x3c/0x68 [ 24.167933] kasan_save_track+0x20/0x40 [ 24.168036] kasan_save_alloc_info+0x40/0x58 [ 24.168127] __kasan_kmalloc+0xd4/0xd8 [ 24.168212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.168365] kasan_atomics+0xb8/0x2e0 [ 24.168491] kunit_try_run_case+0x170/0x3f0 [ 24.168603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.168723] kthread+0x328/0x630 [ 24.168844] ret_from_fork+0x10/0x20 [ 24.168929] [ 24.168984] The buggy address belongs to the object at fff00000c63eb100 [ 24.168984] which belongs to the cache kmalloc-64 of size 64 [ 24.169168] The buggy address is located 0 bytes to the right of [ 24.169168] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.169377] [ 24.169452] The buggy address belongs to the physical page: [ 24.169554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.169728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.169894] page_type: f5(slab) [ 24.169988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.170112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.170259] page dumped because: kasan: bad access detected [ 24.170342] [ 24.170406] Memory state around the buggy address: [ 24.170497] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.170618] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.170729] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.170862] ^ [ 24.171010] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.171151] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.171277] ================================================================== [ 24.143422] ================================================================== [ 24.143551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 24.143668] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.143791] [ 24.143877] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.144094] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.144177] Hardware name: linux,dummy-virt (DT) [ 24.144262] Call trace: [ 24.144325] show_stack+0x20/0x38 (C) [ 24.144449] dump_stack_lvl+0x8c/0xd0 [ 24.144585] print_report+0x118/0x608 [ 24.144715] kasan_report+0xdc/0x128 [ 24.144835] kasan_check_range+0x100/0x1a8 [ 24.144961] __kasan_check_write+0x20/0x30 [ 24.145089] kasan_atomics_helper+0x11f8/0x4858 [ 24.145206] kasan_atomics+0x198/0x2e0 [ 24.145333] kunit_try_run_case+0x170/0x3f0 [ 24.145460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.145993] kthread+0x328/0x630 [ 24.146490] ret_from_fork+0x10/0x20 [ 24.146804] [ 24.146879] Allocated by task 275: [ 24.146955] kasan_save_stack+0x3c/0x68 [ 24.147071] kasan_save_track+0x20/0x40 [ 24.147169] kasan_save_alloc_info+0x40/0x58 [ 24.147501] __kasan_kmalloc+0xd4/0xd8 [ 24.147603] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.147725] kasan_atomics+0xb8/0x2e0 [ 24.147923] kunit_try_run_case+0x170/0x3f0 [ 24.148103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.148273] kthread+0x328/0x630 [ 24.148400] ret_from_fork+0x10/0x20 [ 24.148537] [ 24.148631] The buggy address belongs to the object at fff00000c63eb100 [ 24.148631] which belongs to the cache kmalloc-64 of size 64 [ 24.148841] The buggy address is located 0 bytes to the right of [ 24.148841] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.149014] [ 24.149093] The buggy address belongs to the physical page: [ 24.149212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.149344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.149476] page_type: f5(slab) [ 24.149592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.149725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.149875] page dumped because: kasan: bad access detected [ 24.149960] [ 24.150069] Memory state around the buggy address: [ 24.150146] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.151248] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.151405] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.151587] ^ [ 24.151661] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.151748] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.151838] ================================================================== [ 24.184783] ================================================================== [ 24.184894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 24.185011] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.185150] [ 24.185236] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.185461] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.185540] Hardware name: linux,dummy-virt (DT) [ 24.185620] Call trace: [ 24.185680] show_stack+0x20/0x38 (C) [ 24.185804] dump_stack_lvl+0x8c/0xd0 [ 24.185926] print_report+0x118/0x608 [ 24.186063] kasan_report+0xdc/0x128 [ 24.186169] kasan_check_range+0x100/0x1a8 [ 24.186369] __kasan_check_write+0x20/0x30 [ 24.186500] kasan_atomics_helper+0x1414/0x4858 [ 24.186631] kasan_atomics+0x198/0x2e0 [ 24.186737] kunit_try_run_case+0x170/0x3f0 [ 24.186870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.186989] kthread+0x328/0x630 [ 24.187193] ret_from_fork+0x10/0x20 [ 24.187335] [ 24.187381] Allocated by task 275: [ 24.187440] kasan_save_stack+0x3c/0x68 [ 24.187558] kasan_save_track+0x20/0x40 [ 24.187655] kasan_save_alloc_info+0x40/0x58 [ 24.187752] __kasan_kmalloc+0xd4/0xd8 [ 24.187866] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.187967] kasan_atomics+0xb8/0x2e0 [ 24.188062] kunit_try_run_case+0x170/0x3f0 [ 24.188163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.188279] kthread+0x328/0x630 [ 24.188384] ret_from_fork+0x10/0x20 [ 24.188489] [ 24.188553] The buggy address belongs to the object at fff00000c63eb100 [ 24.188553] which belongs to the cache kmalloc-64 of size 64 [ 24.188723] The buggy address is located 0 bytes to the right of [ 24.188723] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.188922] [ 24.188978] The buggy address belongs to the physical page: [ 24.189067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.189201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.189325] page_type: f5(slab) [ 24.189416] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.189541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.189652] page dumped because: kasan: bad access detected [ 24.189741] [ 24.189789] Memory state around the buggy address: [ 24.189873] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.189987] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.190126] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.190224] ^ [ 24.190347] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.190472] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.190575] ================================================================== [ 23.978982] ================================================================== [ 23.979185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 23.979336] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.979470] [ 23.979854] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.980559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.981012] Hardware name: linux,dummy-virt (DT) [ 23.981136] Call trace: [ 23.981222] show_stack+0x20/0x38 (C) [ 23.981362] dump_stack_lvl+0x8c/0xd0 [ 23.981493] print_report+0x118/0x608 [ 23.982405] kasan_report+0xdc/0x128 [ 23.982686] kasan_check_range+0x100/0x1a8 [ 23.983232] __kasan_check_write+0x20/0x30 [ 23.983399] kasan_atomics_helper+0xd3c/0x4858 [ 23.983856] kasan_atomics+0x198/0x2e0 [ 23.984229] kunit_try_run_case+0x170/0x3f0 [ 23.984380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.985075] kthread+0x328/0x630 [ 23.985446] ret_from_fork+0x10/0x20 [ 23.985589] [ 23.985637] Allocated by task 275: [ 23.986141] kasan_save_stack+0x3c/0x68 [ 23.986298] kasan_save_track+0x20/0x40 [ 23.986398] kasan_save_alloc_info+0x40/0x58 [ 23.986491] __kasan_kmalloc+0xd4/0xd8 [ 23.986569] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.986647] kasan_atomics+0xb8/0x2e0 [ 23.986724] kunit_try_run_case+0x170/0x3f0 [ 23.987579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.987729] kthread+0x328/0x630 [ 23.987813] ret_from_fork+0x10/0x20 [ 23.988159] [ 23.988216] The buggy address belongs to the object at fff00000c63eb100 [ 23.988216] which belongs to the cache kmalloc-64 of size 64 [ 23.988805] The buggy address is located 0 bytes to the right of [ 23.988805] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.989306] [ 23.989438] The buggy address belongs to the physical page: [ 23.989524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.989745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.989865] page_type: f5(slab) [ 23.990665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.990833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.991026] page dumped because: kasan: bad access detected [ 23.991154] [ 23.991215] Memory state around the buggy address: [ 23.991293] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.991388] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.991481] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.991569] ^ [ 23.992268] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.992383] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.992436] ================================================================== [ 24.020936] ================================================================== [ 24.021292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 24.021431] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.021564] [ 24.021652] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.021870] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.021955] Hardware name: linux,dummy-virt (DT) [ 24.022054] Call trace: [ 24.022393] show_stack+0x20/0x38 (C) [ 24.022567] dump_stack_lvl+0x8c/0xd0 [ 24.022698] print_report+0x118/0x608 [ 24.022824] kasan_report+0xdc/0x128 [ 24.022952] kasan_check_range+0x100/0x1a8 [ 24.023075] __kasan_check_write+0x20/0x30 [ 24.023178] kasan_atomics_helper+0xe44/0x4858 [ 24.023297] kasan_atomics+0x198/0x2e0 [ 24.023406] kunit_try_run_case+0x170/0x3f0 [ 24.023524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.023654] kthread+0x328/0x630 [ 24.023756] ret_from_fork+0x10/0x20 [ 24.023873] [ 24.023928] Allocated by task 275: [ 24.023999] kasan_save_stack+0x3c/0x68 [ 24.024115] kasan_save_track+0x20/0x40 [ 24.024216] kasan_save_alloc_info+0x40/0x58 [ 24.024322] __kasan_kmalloc+0xd4/0xd8 [ 24.024419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.024524] kasan_atomics+0xb8/0x2e0 [ 24.024632] kunit_try_run_case+0x170/0x3f0 [ 24.024730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.024840] kthread+0x328/0x630 [ 24.024922] ret_from_fork+0x10/0x20 [ 24.025010] [ 24.025070] The buggy address belongs to the object at fff00000c63eb100 [ 24.025070] which belongs to the cache kmalloc-64 of size 64 [ 24.025208] The buggy address is located 0 bytes to the right of [ 24.025208] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.026143] [ 24.026233] The buggy address belongs to the physical page: [ 24.026312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.026432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.026776] page_type: f5(slab) [ 24.026878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.026994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.027103] page dumped because: kasan: bad access detected [ 24.027376] [ 24.027424] Memory state around the buggy address: [ 24.027503] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.027606] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.027714] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.027811] ^ [ 24.027895] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.028004] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.028107] ================================================================== [ 23.818953] ================================================================== [ 23.819120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 23.819252] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.819393] [ 23.819495] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.819673] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.819738] Hardware name: linux,dummy-virt (DT) [ 23.819799] Call trace: [ 23.819845] show_stack+0x20/0x38 (C) [ 23.819953] dump_stack_lvl+0x8c/0xd0 [ 23.820072] print_report+0x118/0x608 [ 23.820215] kasan_report+0xdc/0x128 [ 23.820344] __asan_report_load4_noabort+0x20/0x30 [ 23.820485] kasan_atomics_helper+0x42d8/0x4858 [ 23.820644] kasan_atomics+0x198/0x2e0 [ 23.820777] kunit_try_run_case+0x170/0x3f0 [ 23.820886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.820998] kthread+0x328/0x630 [ 23.821108] ret_from_fork+0x10/0x20 [ 23.821220] [ 23.821283] Allocated by task 275: [ 23.821362] kasan_save_stack+0x3c/0x68 [ 23.821485] kasan_save_track+0x20/0x40 [ 23.821579] kasan_save_alloc_info+0x40/0x58 [ 23.821668] __kasan_kmalloc+0xd4/0xd8 [ 23.821760] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.821850] kasan_atomics+0xb8/0x2e0 [ 23.821926] kunit_try_run_case+0x170/0x3f0 [ 23.822025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.822141] kthread+0x328/0x630 [ 23.822219] ret_from_fork+0x10/0x20 [ 23.822303] [ 23.822350] The buggy address belongs to the object at fff00000c63eb100 [ 23.822350] which belongs to the cache kmalloc-64 of size 64 [ 23.822490] The buggy address is located 0 bytes to the right of [ 23.822490] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.822672] [ 23.822728] The buggy address belongs to the physical page: [ 23.822796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.822914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.823015] page_type: f5(slab) [ 23.823114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.823244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.823388] page dumped because: kasan: bad access detected [ 23.823544] [ 23.823593] Memory state around the buggy address: [ 23.823690] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.823833] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.823922] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.824000] ^ [ 23.824106] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.824202] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.824280] ================================================================== [ 23.796407] ================================================================== [ 23.796537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 23.797208] Call trace: [ 23.798582] kasan_atomics_helper+0x7cc/0x4858 [ 23.799304] Allocated by task 275: [ 23.800593] kthread+0x328/0x630 [ 23.801384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.801505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.801834] page_type: f5(slab) [ 23.801924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.802135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.802235] page dumped because: kasan: bad access detected [ 23.802324] [ 23.802370] Memory state around the buggy address: [ 23.802501] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.802944] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.803594] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.803998] ================================================================== [ 23.846438] ================================================================== [ 23.846560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 23.846773] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.846955] [ 23.847050] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.847277] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.847351] Hardware name: linux,dummy-virt (DT) [ 23.847425] Call trace: [ 23.847476] show_stack+0x20/0x38 (C) [ 23.847567] dump_stack_lvl+0x8c/0xd0 [ 23.847662] print_report+0x118/0x608 [ 23.847764] kasan_report+0xdc/0x128 [ 23.847875] kasan_check_range+0x100/0x1a8 [ 23.848455] __kasan_check_write+0x20/0x30 [ 23.848982] kasan_atomics_helper+0xa6c/0x4858 [ 23.849475] kasan_atomics+0x198/0x2e0 [ 23.849618] kunit_try_run_case+0x170/0x3f0 [ 23.849739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.849992] kthread+0x328/0x630 [ 23.851002] ret_from_fork+0x10/0x20 [ 23.851183] [ 23.851238] Allocated by task 275: [ 23.851381] kasan_save_stack+0x3c/0x68 [ 23.851482] kasan_save_track+0x20/0x40 [ 23.851576] kasan_save_alloc_info+0x40/0x58 [ 23.851664] __kasan_kmalloc+0xd4/0xd8 [ 23.851750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.852295] kasan_atomics+0xb8/0x2e0 [ 23.852397] kunit_try_run_case+0x170/0x3f0 [ 23.852897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.853014] kthread+0x328/0x630 [ 23.853104] ret_from_fork+0x10/0x20 [ 23.853500] [ 23.853553] The buggy address belongs to the object at fff00000c63eb100 [ 23.853553] which belongs to the cache kmalloc-64 of size 64 [ 23.854108] The buggy address is located 0 bytes to the right of [ 23.854108] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.854275] [ 23.854326] The buggy address belongs to the physical page: [ 23.854399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.854505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.854603] page_type: f5(slab) [ 23.854685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.855251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.855499] page dumped because: kasan: bad access detected [ 23.855928] [ 23.855985] Memory state around the buggy address: [ 23.856184] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.856385] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.856631] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.856740] ^ [ 23.856829] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.856939] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.857443] ================================================================== [ 24.191205] ================================================================== [ 24.191319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 24.191432] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.191548] [ 24.191624] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.191835] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.191907] Hardware name: linux,dummy-virt (DT) [ 24.191984] Call trace: [ 24.192053] show_stack+0x20/0x38 (C) [ 24.192175] dump_stack_lvl+0x8c/0xd0 [ 24.192306] print_report+0x118/0x608 [ 24.192472] kasan_report+0xdc/0x128 [ 24.192654] kasan_check_range+0x100/0x1a8 [ 24.192820] __kasan_check_write+0x20/0x30 [ 24.192960] kasan_atomics_helper+0x147c/0x4858 [ 24.193082] kasan_atomics+0x198/0x2e0 [ 24.193192] kunit_try_run_case+0x170/0x3f0 [ 24.193356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.193520] kthread+0x328/0x630 [ 24.193661] ret_from_fork+0x10/0x20 [ 24.193781] [ 24.193831] Allocated by task 275: [ 24.193906] kasan_save_stack+0x3c/0x68 [ 24.194063] kasan_save_track+0x20/0x40 [ 24.194166] kasan_save_alloc_info+0x40/0x58 [ 24.194279] __kasan_kmalloc+0xd4/0xd8 [ 24.194386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.194498] kasan_atomics+0xb8/0x2e0 [ 24.194594] kunit_try_run_case+0x170/0x3f0 [ 24.194798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.195094] kthread+0x328/0x630 [ 24.195409] ret_from_fork+0x10/0x20 [ 24.195588] [ 24.195687] The buggy address belongs to the object at fff00000c63eb100 [ 24.195687] which belongs to the cache kmalloc-64 of size 64 [ 24.195836] The buggy address is located 0 bytes to the right of [ 24.195836] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.195997] [ 24.196058] The buggy address belongs to the physical page: [ 24.196133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.196557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.196709] page_type: f5(slab) [ 24.197104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.197519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.197672] page dumped because: kasan: bad access detected [ 24.197771] [ 24.197922] Memory state around the buggy address: [ 24.198093] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.198197] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.198276] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.198320] ^ [ 24.198360] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.198433] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.198518] ================================================================== [ 24.220781] ================================================================== [ 24.220937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 24.221044] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.221126] [ 24.221388] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.221500] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.221537] Hardware name: linux,dummy-virt (DT) [ 24.221578] Call trace: [ 24.221609] show_stack+0x20/0x38 (C) [ 24.222120] dump_stack_lvl+0x8c/0xd0 [ 24.222207] print_report+0x118/0x608 [ 24.222288] kasan_report+0xdc/0x128 [ 24.222418] kasan_check_range+0x100/0x1a8 [ 24.222480] __kasan_check_write+0x20/0x30 [ 24.222536] kasan_atomics_helper+0x15b4/0x4858 [ 24.223253] kasan_atomics+0x198/0x2e0 [ 24.224034] kunit_try_run_case+0x170/0x3f0 [ 24.224149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.224218] kthread+0x328/0x630 [ 24.224269] ret_from_fork+0x10/0x20 [ 24.224333] [ 24.224358] Allocated by task 275: [ 24.224396] kasan_save_stack+0x3c/0x68 [ 24.224451] kasan_save_track+0x20/0x40 [ 24.224498] kasan_save_alloc_info+0x40/0x58 [ 24.224571] __kasan_kmalloc+0xd4/0xd8 [ 24.224621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.224669] kasan_atomics+0xb8/0x2e0 [ 24.225689] kunit_try_run_case+0x170/0x3f0 [ 24.226052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.226171] kthread+0x328/0x630 [ 24.226345] ret_from_fork+0x10/0x20 [ 24.226434] [ 24.226465] The buggy address belongs to the object at fff00000c63eb100 [ 24.226465] which belongs to the cache kmalloc-64 of size 64 [ 24.226692] The buggy address is located 0 bytes to the right of [ 24.226692] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.226777] [ 24.226930] The buggy address belongs to the physical page: [ 24.227001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.227800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.227964] page_type: f5(slab) [ 24.228016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.228389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.228721] page dumped because: kasan: bad access detected [ 24.228776] [ 24.228801] Memory state around the buggy address: [ 24.228995] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.229177] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.229230] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.229453] ^ [ 24.229504] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.229655] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.229705] ================================================================== [ 24.125068] ================================================================== [ 24.125229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 24.125373] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.125482] [ 24.125570] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.125743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.125807] Hardware name: linux,dummy-virt (DT) [ 24.125882] Call trace: [ 24.125940] show_stack+0x20/0x38 (C) [ 24.126468] dump_stack_lvl+0x8c/0xd0 [ 24.126834] print_report+0x118/0x608 [ 24.127225] kasan_report+0xdc/0x128 [ 24.127530] kasan_check_range+0x100/0x1a8 [ 24.127677] __kasan_check_write+0x20/0x30 [ 24.127782] kasan_atomics_helper+0x1128/0x4858 [ 24.127913] kasan_atomics+0x198/0x2e0 [ 24.128043] kunit_try_run_case+0x170/0x3f0 [ 24.128172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.128306] kthread+0x328/0x630 [ 24.128409] ret_from_fork+0x10/0x20 [ 24.128542] [ 24.128599] Allocated by task 275: [ 24.128675] kasan_save_stack+0x3c/0x68 [ 24.128774] kasan_save_track+0x20/0x40 [ 24.128867] kasan_save_alloc_info+0x40/0x58 [ 24.129783] __kasan_kmalloc+0xd4/0xd8 [ 24.129910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.130012] kasan_atomics+0xb8/0x2e0 [ 24.130108] kunit_try_run_case+0x170/0x3f0 [ 24.130207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.130322] kthread+0x328/0x630 [ 24.130405] ret_from_fork+0x10/0x20 [ 24.130498] [ 24.130557] The buggy address belongs to the object at fff00000c63eb100 [ 24.130557] which belongs to the cache kmalloc-64 of size 64 [ 24.131196] The buggy address is located 0 bytes to the right of [ 24.131196] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.131368] [ 24.131424] The buggy address belongs to the physical page: [ 24.131626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.131750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.132042] page_type: f5(slab) [ 24.132154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.132290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.132399] page dumped because: kasan: bad access detected [ 24.132487] [ 24.132572] Memory state around the buggy address: [ 24.132708] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.132825] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.132928] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.133034] ^ [ 24.133124] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.133252] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.133390] ================================================================== [ 24.230936] ================================================================== [ 24.231084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 24.231223] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.231290] [ 24.231372] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.231513] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.231566] Hardware name: linux,dummy-virt (DT) [ 24.231639] Call trace: [ 24.231676] show_stack+0x20/0x38 (C) [ 24.231737] dump_stack_lvl+0x8c/0xd0 [ 24.231795] print_report+0x118/0x608 [ 24.231849] kasan_report+0xdc/0x128 [ 24.231903] __asan_report_load8_noabort+0x20/0x30 [ 24.231962] kasan_atomics_helper+0x3db0/0x4858 [ 24.232030] kasan_atomics+0x198/0x2e0 [ 24.232089] kunit_try_run_case+0x170/0x3f0 [ 24.232145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.232205] kthread+0x328/0x630 [ 24.232255] ret_from_fork+0x10/0x20 [ 24.232727] [ 24.232913] Allocated by task 275: [ 24.233080] kasan_save_stack+0x3c/0x68 [ 24.233155] kasan_save_track+0x20/0x40 [ 24.233235] kasan_save_alloc_info+0x40/0x58 [ 24.233446] __kasan_kmalloc+0xd4/0xd8 [ 24.233635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.233845] kasan_atomics+0xb8/0x2e0 [ 24.234064] kunit_try_run_case+0x170/0x3f0 [ 24.234568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.234628] kthread+0x328/0x630 [ 24.234668] ret_from_fork+0x10/0x20 [ 24.234709] [ 24.234736] The buggy address belongs to the object at fff00000c63eb100 [ 24.234736] which belongs to the cache kmalloc-64 of size 64 [ 24.234801] The buggy address is located 0 bytes to the right of [ 24.234801] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.235476] [ 24.235550] The buggy address belongs to the physical page: [ 24.235599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.235664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.235721] page_type: f5(slab) [ 24.235768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.235825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.235872] page dumped because: kasan: bad access detected [ 24.236228] [ 24.236471] Memory state around the buggy address: [ 24.236523] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.236591] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.236721] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.236820] ^ [ 24.236935] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.237042] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.237091] ================================================================== [ 24.011859] ================================================================== [ 24.012004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 24.012172] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.012282] [ 24.012363] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.012627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.012733] Hardware name: linux,dummy-virt (DT) [ 24.012821] Call trace: [ 24.012892] show_stack+0x20/0x38 (C) [ 24.013078] dump_stack_lvl+0x8c/0xd0 [ 24.013233] print_report+0x118/0x608 [ 24.013391] kasan_report+0xdc/0x128 [ 24.013542] __asan_report_load8_noabort+0x20/0x30 [ 24.013708] kasan_atomics_helper+0x3f58/0x4858 [ 24.013870] kasan_atomics+0x198/0x2e0 [ 24.013979] kunit_try_run_case+0x170/0x3f0 [ 24.014164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.014314] kthread+0x328/0x630 [ 24.014414] ret_from_fork+0x10/0x20 [ 24.014528] [ 24.014581] Allocated by task 275: [ 24.014657] kasan_save_stack+0x3c/0x68 [ 24.014785] kasan_save_track+0x20/0x40 [ 24.014898] kasan_save_alloc_info+0x40/0x58 [ 24.015004] __kasan_kmalloc+0xd4/0xd8 [ 24.015110] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.015211] kasan_atomics+0xb8/0x2e0 [ 24.015281] kunit_try_run_case+0x170/0x3f0 [ 24.015370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.015470] kthread+0x328/0x630 [ 24.015527] ret_from_fork+0x10/0x20 [ 24.015602] [ 24.015658] The buggy address belongs to the object at fff00000c63eb100 [ 24.015658] which belongs to the cache kmalloc-64 of size 64 [ 24.015805] The buggy address is located 0 bytes to the right of [ 24.015805] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.015972] [ 24.016059] The buggy address belongs to the physical page: [ 24.016149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.016288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.016882] page_type: f5(slab) [ 24.017052] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.017232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.017339] page dumped because: kasan: bad access detected [ 24.017432] [ 24.017848] Memory state around the buggy address: [ 24.017951] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.018420] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.018595] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.018749] ^ [ 24.019256] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.019403] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.019576] ================================================================== [ 24.209305] ================================================================== [ 24.209667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 24.209814] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.209999] [ 24.210130] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.210372] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.210450] Hardware name: linux,dummy-virt (DT) [ 24.210525] Call trace: [ 24.210573] show_stack+0x20/0x38 (C) [ 24.210669] dump_stack_lvl+0x8c/0xd0 [ 24.210777] print_report+0x118/0x608 [ 24.210880] kasan_report+0xdc/0x128 [ 24.210994] kasan_check_range+0x100/0x1a8 [ 24.211126] __kasan_check_write+0x20/0x30 [ 24.211239] kasan_atomics_helper+0x154c/0x4858 [ 24.211357] kasan_atomics+0x198/0x2e0 [ 24.211542] kunit_try_run_case+0x170/0x3f0 [ 24.211659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.211792] kthread+0x328/0x630 [ 24.211893] ret_from_fork+0x10/0x20 [ 24.212011] [ 24.212486] Allocated by task 275: [ 24.212701] kasan_save_stack+0x3c/0x68 [ 24.212961] kasan_save_track+0x20/0x40 [ 24.213306] kasan_save_alloc_info+0x40/0x58 [ 24.213440] __kasan_kmalloc+0xd4/0xd8 [ 24.213582] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.213689] kasan_atomics+0xb8/0x2e0 [ 24.214010] kunit_try_run_case+0x170/0x3f0 [ 24.214177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.214333] kthread+0x328/0x630 [ 24.214450] ret_from_fork+0x10/0x20 [ 24.214779] [ 24.214841] The buggy address belongs to the object at fff00000c63eb100 [ 24.214841] which belongs to the cache kmalloc-64 of size 64 [ 24.214992] The buggy address is located 0 bytes to the right of [ 24.214992] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.215171] [ 24.215225] The buggy address belongs to the physical page: [ 24.215401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.215537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.216071] page_type: f5(slab) [ 24.216182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.216634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.216751] page dumped because: kasan: bad access detected [ 24.217258] [ 24.217328] Memory state around the buggy address: [ 24.217422] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.217531] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.217644] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.217744] ^ [ 24.218444] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.218580] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.218683] ================================================================== [ 24.000101] ================================================================== [ 24.000211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 24.000332] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.000453] [ 24.000539] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.000834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.000931] Hardware name: linux,dummy-virt (DT) [ 24.001040] Call trace: [ 24.001379] show_stack+0x20/0x38 (C) [ 24.001686] dump_stack_lvl+0x8c/0xd0 [ 24.001815] print_report+0x118/0x608 [ 24.001935] kasan_report+0xdc/0x128 [ 24.002807] kasan_check_range+0x100/0x1a8 [ 24.002973] __kasan_check_read+0x20/0x30 [ 24.003088] kasan_atomics_helper+0xdd4/0x4858 [ 24.003204] kasan_atomics+0x198/0x2e0 [ 24.003537] kunit_try_run_case+0x170/0x3f0 [ 24.004152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.004293] kthread+0x328/0x630 [ 24.004701] ret_from_fork+0x10/0x20 [ 24.004998] [ 24.005360] Allocated by task 275: [ 24.005725] kasan_save_stack+0x3c/0x68 [ 24.005847] kasan_save_track+0x20/0x40 [ 24.005949] kasan_save_alloc_info+0x40/0x58 [ 24.006053] __kasan_kmalloc+0xd4/0xd8 [ 24.006131] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.006219] kasan_atomics+0xb8/0x2e0 [ 24.006307] kunit_try_run_case+0x170/0x3f0 [ 24.006944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.007432] kthread+0x328/0x630 [ 24.007532] ret_from_fork+0x10/0x20 [ 24.007805] [ 24.007878] The buggy address belongs to the object at fff00000c63eb100 [ 24.007878] which belongs to the cache kmalloc-64 of size 64 [ 24.008170] The buggy address is located 0 bytes to the right of [ 24.008170] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.008316] [ 24.008398] The buggy address belongs to the physical page: [ 24.008475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.008643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.008832] page_type: f5(slab) [ 24.008954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.009096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.009204] page dumped because: kasan: bad access detected [ 24.009286] [ 24.009338] Memory state around the buggy address: [ 24.009420] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.009573] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.009683] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.009782] ^ [ 24.009907] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.010049] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.010156] ================================================================== [ 24.153442] ================================================================== [ 24.153869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 24.154205] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.154521] [ 24.154625] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.154855] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.154931] Hardware name: linux,dummy-virt (DT) [ 24.155009] Call trace: [ 24.155592] show_stack+0x20/0x38 (C) [ 24.155750] dump_stack_lvl+0x8c/0xd0 [ 24.155965] print_report+0x118/0x608 [ 24.156196] kasan_report+0xdc/0x128 [ 24.156602] kasan_check_range+0x100/0x1a8 [ 24.156810] __kasan_check_write+0x20/0x30 [ 24.157129] kasan_atomics_helper+0x126c/0x4858 [ 24.157322] kasan_atomics+0x198/0x2e0 [ 24.157439] kunit_try_run_case+0x170/0x3f0 [ 24.157631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.157781] kthread+0x328/0x630 [ 24.158154] ret_from_fork+0x10/0x20 [ 24.158302] [ 24.158434] Allocated by task 275: [ 24.158616] kasan_save_stack+0x3c/0x68 [ 24.158726] kasan_save_track+0x20/0x40 [ 24.158817] kasan_save_alloc_info+0x40/0x58 [ 24.158908] __kasan_kmalloc+0xd4/0xd8 [ 24.158998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.159109] kasan_atomics+0xb8/0x2e0 [ 24.159202] kunit_try_run_case+0x170/0x3f0 [ 24.159693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.159872] kthread+0x328/0x630 [ 24.159994] ret_from_fork+0x10/0x20 [ 24.160213] [ 24.160362] The buggy address belongs to the object at fff00000c63eb100 [ 24.160362] which belongs to the cache kmalloc-64 of size 64 [ 24.160716] The buggy address is located 0 bytes to the right of [ 24.160716] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.161096] [ 24.161193] The buggy address belongs to the physical page: [ 24.161426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.161789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.161936] page_type: f5(slab) [ 24.162053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.162185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.162291] page dumped because: kasan: bad access detected [ 24.162623] [ 24.162711] Memory state around the buggy address: [ 24.162871] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.163344] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.163588] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.163786] ^ [ 24.163965] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.164251] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.164359] ================================================================== [ 23.626665] ================================================================== [ 23.627928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 23.628861] Call trace: [ 23.629883] kunit_try_run_case+0x170/0x3f0 [ 23.631092] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.631822] The buggy address is located 0 bytes to the right of [ 23.631822] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.633149] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.634572] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.637084] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.641488] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.645318] dump_stack_lvl+0x8c/0xd0 [ 23.646687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.650676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.657106] kasan_check_range+0x100/0x1a8 [ 23.659364] kasan_save_stack+0x3c/0x68 [ 23.661668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.667037] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.673179] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.676375] page dumped because: kasan: bad access detected [ 23.680830] [ 23.681663] dump_stack_lvl+0x8c/0xd0 [ 23.684392] kasan_save_stack+0x3c/0x68 [ 23.687127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.691013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 23.692715] kasan_atomics_helper+0x414/0x4858 [ 23.694106] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.694374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.694624] [ 23.695651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.698604] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.702283] kasan_report+0xdc/0x128 [ 23.703501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.704463] __kasan_kmalloc+0xd4/0xd8 [ 23.705685] [ 23.706408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.707028] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.711308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 23.712789] dump_stack_lvl+0x8c/0xd0 [ 23.713667] kunit_try_run_case+0x170/0x3f0 [ 23.713781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.713910] kthread+0x328/0x630 [ 23.714767] kasan_save_track+0x20/0x40 [ 23.716473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.716843] kthread+0x328/0x630 [ 23.717486] ret_from_fork+0x10/0x20 [ 23.718777] [ 23.721371] page_type: f5(slab) [ 23.722569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.724608] ^ [ 23.729094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 23.729760] Hardware name: linux,dummy-virt (DT) [ 23.733683] kasan_atomics+0x198/0x2e0 [ 23.735065] kasan_save_track+0x20/0x40 [ 23.735414] kasan_atomics+0xb8/0x2e0 [ 23.736240] [ 23.736292] The buggy address belongs to the physical page: [ 23.736783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.737530] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.739450] ================================================================== [ 24.074641] ================================================================== [ 24.074736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 24.074831] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.074925] [ 24.074989] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.075220] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.075334] Hardware name: linux,dummy-virt (DT) [ 24.075426] Call trace: [ 24.075560] show_stack+0x20/0x38 (C) [ 24.076886] dump_stack_lvl+0x8c/0xd0 [ 24.077129] print_report+0x118/0x608 [ 24.077698] kasan_report+0xdc/0x128 [ 24.078257] kasan_check_range+0x100/0x1a8 [ 24.078873] __kasan_check_write+0x20/0x30 [ 24.079007] kasan_atomics_helper+0xff0/0x4858 [ 24.079123] kasan_atomics+0x198/0x2e0 [ 24.079220] kunit_try_run_case+0x170/0x3f0 [ 24.079331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.079585] kthread+0x328/0x630 [ 24.079783] ret_from_fork+0x10/0x20 [ 24.080994] [ 24.081087] Allocated by task 275: [ 24.081174] kasan_save_stack+0x3c/0x68 [ 24.081286] kasan_save_track+0x20/0x40 [ 24.081380] kasan_save_alloc_info+0x40/0x58 [ 24.081488] __kasan_kmalloc+0xd4/0xd8 [ 24.082315] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.082444] kasan_atomics+0xb8/0x2e0 [ 24.082523] kunit_try_run_case+0x170/0x3f0 [ 24.082601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.082694] kthread+0x328/0x630 [ 24.082771] ret_from_fork+0x10/0x20 [ 24.083397] [ 24.083499] The buggy address belongs to the object at fff00000c63eb100 [ 24.083499] which belongs to the cache kmalloc-64 of size 64 [ 24.083882] The buggy address is located 0 bytes to the right of [ 24.083882] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.084069] [ 24.084148] The buggy address belongs to the physical page: [ 24.084272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.084416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.084550] page_type: f5(slab) [ 24.084648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.084781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.084892] page dumped because: kasan: bad access detected [ 24.084981] [ 24.085043] Memory state around the buggy address: [ 24.085436] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.085567] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.086116] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.086491] ^ [ 24.086608] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.087502] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.087716] ================================================================== [ 23.831681] ================================================================== [ 23.831803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 23.831917] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.832050] [ 23.832138] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.832417] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.832490] Hardware name: linux,dummy-virt (DT) [ 23.832617] Call trace: [ 23.832706] show_stack+0x20/0x38 (C) [ 23.832820] dump_stack_lvl+0x8c/0xd0 [ 23.832933] print_report+0x118/0x608 [ 23.833041] kasan_report+0xdc/0x128 [ 23.833142] kasan_check_range+0x100/0x1a8 [ 23.833253] __kasan_check_write+0x20/0x30 [ 23.833359] kasan_atomics_helper+0x99c/0x4858 [ 23.833472] kasan_atomics+0x198/0x2e0 [ 23.833578] kunit_try_run_case+0x170/0x3f0 [ 23.833685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.833803] kthread+0x328/0x630 [ 23.833904] ret_from_fork+0x10/0x20 [ 23.834012] [ 23.834078] Allocated by task 275: [ 23.834146] kasan_save_stack+0x3c/0x68 [ 23.834235] kasan_save_track+0x20/0x40 [ 23.834319] kasan_save_alloc_info+0x40/0x58 [ 23.834407] __kasan_kmalloc+0xd4/0xd8 [ 23.834494] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.834584] kasan_atomics+0xb8/0x2e0 [ 23.834662] kunit_try_run_case+0x170/0x3f0 [ 23.834746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.834842] kthread+0x328/0x630 [ 23.834925] ret_from_fork+0x10/0x20 [ 23.835006] [ 23.835129] The buggy address belongs to the object at fff00000c63eb100 [ 23.835129] which belongs to the cache kmalloc-64 of size 64 [ 23.835300] The buggy address is located 0 bytes to the right of [ 23.835300] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.835467] [ 23.835520] The buggy address belongs to the physical page: [ 23.835596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.835726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.835850] page_type: f5(slab) [ 23.835947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.836092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.836216] page dumped because: kasan: bad access detected [ 23.836314] [ 23.836381] Memory state around the buggy address: [ 23.836504] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.836627] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.836722] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.836834] ^ [ 23.836915] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.837071] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.837164] ==================================================================
[ 13.810829] ================================================================== [ 13.811138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 13.811651] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.812183] [ 13.812393] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.812444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.812457] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.812479] Call Trace: [ 13.812589] <TASK> [ 13.812609] dump_stack_lvl+0x73/0xb0 [ 13.812640] print_report+0xd1/0x650 [ 13.812667] ? __virt_addr_valid+0x1db/0x2d0 [ 13.812690] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.812712] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.812738] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.812759] kasan_report+0x141/0x180 [ 13.812780] ? kasan_atomics_helper+0x7c7/0x5450 [ 13.812806] kasan_check_range+0x10c/0x1c0 [ 13.812829] __kasan_check_write+0x18/0x20 [ 13.812851] kasan_atomics_helper+0x7c7/0x5450 [ 13.812873] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.812895] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.812920] ? kasan_atomics+0x152/0x310 [ 13.812946] kasan_atomics+0x1dc/0x310 [ 13.812968] ? __pfx_kasan_atomics+0x10/0x10 [ 13.812991] ? __pfx_read_tsc+0x10/0x10 [ 13.813015] ? ktime_get_ts64+0x86/0x230 [ 13.813040] kunit_try_run_case+0x1a5/0x480 [ 13.813064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.813086] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.813108] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.813130] ? __kthread_parkme+0x82/0x180 [ 13.813151] ? preempt_count_sub+0x50/0x80 [ 13.813175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.813197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.813232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.813255] kthread+0x337/0x6f0 [ 13.813274] ? trace_preempt_on+0x20/0xc0 [ 13.813297] ? __pfx_kthread+0x10/0x10 [ 13.813320] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.813341] ? calculate_sigpending+0x7b/0xa0 [ 13.813365] ? __pfx_kthread+0x10/0x10 [ 13.813387] ret_from_fork+0x116/0x1d0 [ 13.813406] ? __pfx_kthread+0x10/0x10 [ 13.813427] ret_from_fork_asm+0x1a/0x30 [ 13.813457] </TASK> [ 13.813468] [ 13.823775] Allocated by task 291: [ 13.824099] kasan_save_stack+0x45/0x70 [ 13.824388] kasan_save_track+0x18/0x40 [ 13.824671] kasan_save_alloc_info+0x3b/0x50 [ 13.824870] __kasan_kmalloc+0xb7/0xc0 [ 13.825045] __kmalloc_cache_noprof+0x189/0x420 [ 13.825527] kasan_atomics+0x95/0x310 [ 13.825703] kunit_try_run_case+0x1a5/0x480 [ 13.826026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.826341] kthread+0x337/0x6f0 [ 13.826614] ret_from_fork+0x116/0x1d0 [ 13.826868] ret_from_fork_asm+0x1a/0x30 [ 13.827129] [ 13.827201] The buggy address belongs to the object at ffff8881029e2200 [ 13.827201] which belongs to the cache kmalloc-64 of size 64 [ 13.827991] The buggy address is located 0 bytes to the right of [ 13.827991] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.828687] [ 13.828775] The buggy address belongs to the physical page: [ 13.829135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.829611] flags: 0x200000000000000(node=0|zone=2) [ 13.829916] page_type: f5(slab) [ 13.830180] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.830520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.830800] page dumped because: kasan: bad access detected [ 13.831041] [ 13.831117] Memory state around the buggy address: [ 13.831709] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.832087] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.832606] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.833033] ^ [ 13.833379] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.833770] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.834154] ================================================================== [ 14.427257] ================================================================== [ 14.427558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 14.428021] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.428400] [ 14.428516] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.428562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.428586] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.428607] Call Trace: [ 14.428622] <TASK> [ 14.428637] dump_stack_lvl+0x73/0xb0 [ 14.428666] print_report+0xd1/0x650 [ 14.428688] ? __virt_addr_valid+0x1db/0x2d0 [ 14.428709] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.428731] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.428756] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.428778] kasan_report+0x141/0x180 [ 14.428823] ? kasan_atomics_helper+0x16e7/0x5450 [ 14.428849] kasan_check_range+0x10c/0x1c0 [ 14.428872] __kasan_check_write+0x18/0x20 [ 14.428904] kasan_atomics_helper+0x16e7/0x5450 [ 14.428926] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.428948] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.428983] ? kasan_atomics+0x152/0x310 [ 14.429008] kasan_atomics+0x1dc/0x310 [ 14.429031] ? __pfx_kasan_atomics+0x10/0x10 [ 14.429055] ? __pfx_read_tsc+0x10/0x10 [ 14.429076] ? ktime_get_ts64+0x86/0x230 [ 14.429100] kunit_try_run_case+0x1a5/0x480 [ 14.429123] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429145] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.429166] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.429215] ? __kthread_parkme+0x82/0x180 [ 14.429236] ? preempt_count_sub+0x50/0x80 [ 14.429260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.429283] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.429306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.429329] kthread+0x337/0x6f0 [ 14.429348] ? trace_preempt_on+0x20/0xc0 [ 14.429372] ? __pfx_kthread+0x10/0x10 [ 14.429393] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.429414] ? calculate_sigpending+0x7b/0xa0 [ 14.429437] ? __pfx_kthread+0x10/0x10 [ 14.429459] ret_from_fork+0x116/0x1d0 [ 14.429478] ? __pfx_kthread+0x10/0x10 [ 14.429499] ret_from_fork_asm+0x1a/0x30 [ 14.429530] </TASK> [ 14.429542] [ 14.437140] Allocated by task 291: [ 14.437318] kasan_save_stack+0x45/0x70 [ 14.437478] kasan_save_track+0x18/0x40 [ 14.437631] kasan_save_alloc_info+0x3b/0x50 [ 14.437869] __kasan_kmalloc+0xb7/0xc0 [ 14.438046] __kmalloc_cache_noprof+0x189/0x420 [ 14.438286] kasan_atomics+0x95/0x310 [ 14.438464] kunit_try_run_case+0x1a5/0x480 [ 14.438657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.438896] kthread+0x337/0x6f0 [ 14.439052] ret_from_fork+0x116/0x1d0 [ 14.439259] ret_from_fork_asm+0x1a/0x30 [ 14.439445] [ 14.439529] The buggy address belongs to the object at ffff8881029e2200 [ 14.439529] which belongs to the cache kmalloc-64 of size 64 [ 14.440003] The buggy address is located 0 bytes to the right of [ 14.440003] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.440394] [ 14.440459] The buggy address belongs to the physical page: [ 14.440623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.440971] flags: 0x200000000000000(node=0|zone=2) [ 14.441246] page_type: f5(slab) [ 14.441407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.441767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.442094] page dumped because: kasan: bad access detected [ 14.442385] [ 14.442472] Memory state around the buggy address: [ 14.442676] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.442943] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.443238] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.443512] ^ [ 14.443707] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.443917] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.445973] ================================================================== [ 14.533372] ================================================================== [ 14.533803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 14.534386] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.534686] [ 14.534830] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.534875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.534888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.534909] Call Trace: [ 14.534923] <TASK> [ 14.534937] dump_stack_lvl+0x73/0xb0 [ 14.534962] print_report+0xd1/0x650 [ 14.534983] ? __virt_addr_valid+0x1db/0x2d0 [ 14.535005] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.535025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.535076] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.535098] kasan_report+0x141/0x180 [ 14.535119] ? kasan_atomics_helper+0x1a7f/0x5450 [ 14.535144] kasan_check_range+0x10c/0x1c0 [ 14.535184] __kasan_check_write+0x18/0x20 [ 14.535215] kasan_atomics_helper+0x1a7f/0x5450 [ 14.535238] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.535269] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.535293] ? kasan_atomics+0x152/0x310 [ 14.535318] kasan_atomics+0x1dc/0x310 [ 14.535351] ? __pfx_kasan_atomics+0x10/0x10 [ 14.535375] ? __pfx_read_tsc+0x10/0x10 [ 14.535395] ? ktime_get_ts64+0x86/0x230 [ 14.535420] kunit_try_run_case+0x1a5/0x480 [ 14.535442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.535464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.535485] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.535507] ? __kthread_parkme+0x82/0x180 [ 14.535527] ? preempt_count_sub+0x50/0x80 [ 14.535550] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.535573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.535604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.535627] kthread+0x337/0x6f0 [ 14.535647] ? trace_preempt_on+0x20/0xc0 [ 14.535679] ? __pfx_kthread+0x10/0x10 [ 14.535700] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.535720] ? calculate_sigpending+0x7b/0xa0 [ 14.535743] ? __pfx_kthread+0x10/0x10 [ 14.535765] ret_from_fork+0x116/0x1d0 [ 14.535783] ? __pfx_kthread+0x10/0x10 [ 14.535804] ret_from_fork_asm+0x1a/0x30 [ 14.535833] </TASK> [ 14.535844] [ 14.543361] Allocated by task 291: [ 14.543521] kasan_save_stack+0x45/0x70 [ 14.543714] kasan_save_track+0x18/0x40 [ 14.543864] kasan_save_alloc_info+0x3b/0x50 [ 14.544011] __kasan_kmalloc+0xb7/0xc0 [ 14.544137] __kmalloc_cache_noprof+0x189/0x420 [ 14.544313] kasan_atomics+0x95/0x310 [ 14.544439] kunit_try_run_case+0x1a5/0x480 [ 14.544577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.544746] kthread+0x337/0x6f0 [ 14.544858] ret_from_fork+0x116/0x1d0 [ 14.545008] ret_from_fork_asm+0x1a/0x30 [ 14.545248] [ 14.545334] The buggy address belongs to the object at ffff8881029e2200 [ 14.545334] which belongs to the cache kmalloc-64 of size 64 [ 14.545842] The buggy address is located 0 bytes to the right of [ 14.545842] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.546400] [ 14.546498] The buggy address belongs to the physical page: [ 14.546752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.547116] flags: 0x200000000000000(node=0|zone=2) [ 14.547373] page_type: f5(slab) [ 14.547553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.547843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.548062] page dumped because: kasan: bad access detected [ 14.548257] [ 14.548321] Memory state around the buggy address: [ 14.548469] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.548682] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.548889] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.549243] ^ [ 14.549487] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.549818] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.550158] ================================================================== [ 14.223761] ================================================================== [ 14.224004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 14.224406] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.225081] [ 14.225461] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.225510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.225524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.225633] Call Trace: [ 14.225648] <TASK> [ 14.225663] dump_stack_lvl+0x73/0xb0 [ 14.225692] print_report+0xd1/0x650 [ 14.225714] ? __virt_addr_valid+0x1db/0x2d0 [ 14.225735] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.225757] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.225782] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.225804] kasan_report+0x141/0x180 [ 14.225825] ? kasan_atomics_helper+0x49e8/0x5450 [ 14.225850] __asan_report_load4_noabort+0x18/0x20 [ 14.225874] kasan_atomics_helper+0x49e8/0x5450 [ 14.225896] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.225918] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.225942] ? kasan_atomics+0x152/0x310 [ 14.225967] kasan_atomics+0x1dc/0x310 [ 14.225989] ? __pfx_kasan_atomics+0x10/0x10 [ 14.226013] ? __pfx_read_tsc+0x10/0x10 [ 14.226033] ? ktime_get_ts64+0x86/0x230 [ 14.226058] kunit_try_run_case+0x1a5/0x480 [ 14.226081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.226103] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.226125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.226147] ? __kthread_parkme+0x82/0x180 [ 14.226168] ? preempt_count_sub+0x50/0x80 [ 14.226191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.226226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.226249] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.226271] kthread+0x337/0x6f0 [ 14.226291] ? trace_preempt_on+0x20/0xc0 [ 14.226313] ? __pfx_kthread+0x10/0x10 [ 14.226334] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.226354] ? calculate_sigpending+0x7b/0xa0 [ 14.226378] ? __pfx_kthread+0x10/0x10 [ 14.226400] ret_from_fork+0x116/0x1d0 [ 14.226419] ? __pfx_kthread+0x10/0x10 [ 14.226439] ret_from_fork_asm+0x1a/0x30 [ 14.226469] </TASK> [ 14.226480] [ 14.236472] Allocated by task 291: [ 14.236779] kasan_save_stack+0x45/0x70 [ 14.237036] kasan_save_track+0x18/0x40 [ 14.237228] kasan_save_alloc_info+0x3b/0x50 [ 14.237574] __kasan_kmalloc+0xb7/0xc0 [ 14.237743] __kmalloc_cache_noprof+0x189/0x420 [ 14.238049] kasan_atomics+0x95/0x310 [ 14.238333] kunit_try_run_case+0x1a5/0x480 [ 14.238490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.238833] kthread+0x337/0x6f0 [ 14.238969] ret_from_fork+0x116/0x1d0 [ 14.239154] ret_from_fork_asm+0x1a/0x30 [ 14.239562] [ 14.239658] The buggy address belongs to the object at ffff8881029e2200 [ 14.239658] which belongs to the cache kmalloc-64 of size 64 [ 14.240331] The buggy address is located 0 bytes to the right of [ 14.240331] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.240969] [ 14.241066] The buggy address belongs to the physical page: [ 14.241488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.241811] flags: 0x200000000000000(node=0|zone=2) [ 14.242097] page_type: f5(slab) [ 14.242225] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.242685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.243091] page dumped because: kasan: bad access detected [ 14.243390] [ 14.243640] Memory state around the buggy address: [ 14.243826] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.244183] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.244653] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.245020] ^ [ 14.245219] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.245716] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.246092] ================================================================== [ 13.608292] ================================================================== [ 13.608790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 13.609243] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.609750] [ 13.609860] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.610135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.610149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.610171] Call Trace: [ 13.610182] <TASK> [ 13.610196] dump_stack_lvl+0x73/0xb0 [ 13.610238] print_report+0xd1/0x650 [ 13.610259] ? __virt_addr_valid+0x1db/0x2d0 [ 13.610280] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.610300] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.610325] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.610346] kasan_report+0x141/0x180 [ 13.610366] ? kasan_atomics_helper+0x4b88/0x5450 [ 13.610391] __asan_report_load4_noabort+0x18/0x20 [ 13.610414] kasan_atomics_helper+0x4b88/0x5450 [ 13.610435] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.610456] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.610479] ? kasan_atomics+0x152/0x310 [ 13.610504] kasan_atomics+0x1dc/0x310 [ 13.610525] ? __pfx_kasan_atomics+0x10/0x10 [ 13.610547] ? __pfx_read_tsc+0x10/0x10 [ 13.610567] ? ktime_get_ts64+0x86/0x230 [ 13.610590] kunit_try_run_case+0x1a5/0x480 [ 13.610613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.610634] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.610656] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.610789] ? __kthread_parkme+0x82/0x180 [ 13.610810] ? preempt_count_sub+0x50/0x80 [ 13.610852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.610876] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.610899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.610923] kthread+0x337/0x6f0 [ 13.610942] ? trace_preempt_on+0x20/0xc0 [ 13.610966] ? __pfx_kthread+0x10/0x10 [ 13.610987] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.611008] ? calculate_sigpending+0x7b/0xa0 [ 13.611032] ? __pfx_kthread+0x10/0x10 [ 13.611053] ret_from_fork+0x116/0x1d0 [ 13.611072] ? __pfx_kthread+0x10/0x10 [ 13.611095] ret_from_fork_asm+0x1a/0x30 [ 13.611126] </TASK> [ 13.611137] [ 13.619052] Allocated by task 291: [ 13.619292] kasan_save_stack+0x45/0x70 [ 13.619488] kasan_save_track+0x18/0x40 [ 13.619690] kasan_save_alloc_info+0x3b/0x50 [ 13.619928] __kasan_kmalloc+0xb7/0xc0 [ 13.620115] __kmalloc_cache_noprof+0x189/0x420 [ 13.620677] kasan_atomics+0x95/0x310 [ 13.621117] kunit_try_run_case+0x1a5/0x480 [ 13.621826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.622062] kthread+0x337/0x6f0 [ 13.622241] ret_from_fork+0x116/0x1d0 [ 13.622421] ret_from_fork_asm+0x1a/0x30 [ 13.622594] [ 13.622673] The buggy address belongs to the object at ffff8881029e2200 [ 13.622673] which belongs to the cache kmalloc-64 of size 64 [ 13.623082] The buggy address is located 0 bytes to the right of [ 13.623082] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.623534] [ 13.623598] The buggy address belongs to the physical page: [ 13.623811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.624157] flags: 0x200000000000000(node=0|zone=2) [ 13.624422] page_type: f5(slab) [ 13.624580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.624815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.625129] page dumped because: kasan: bad access detected [ 13.625406] [ 13.625492] Memory state around the buggy address: [ 13.625677] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.625921] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.626235] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.626447] ^ [ 13.626588] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.626890] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.627223] ================================================================== [ 13.747942] ================================================================== [ 13.748422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 13.748887] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.749252] [ 13.749353] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.749400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.749414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.749437] Call Trace: [ 13.749449] <TASK> [ 13.749463] dump_stack_lvl+0x73/0xb0 [ 13.749490] print_report+0xd1/0x650 [ 13.749523] ? __virt_addr_valid+0x1db/0x2d0 [ 13.749545] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.749566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.749602] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.749623] kasan_report+0x141/0x180 [ 13.749645] ? kasan_atomics_helper+0x5fe/0x5450 [ 13.749670] kasan_check_range+0x10c/0x1c0 [ 13.749702] __kasan_check_write+0x18/0x20 [ 13.749724] kasan_atomics_helper+0x5fe/0x5450 [ 13.749746] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.749778] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.749802] ? kasan_atomics+0x152/0x310 [ 13.749827] kasan_atomics+0x1dc/0x310 [ 13.749849] ? __pfx_kasan_atomics+0x10/0x10 [ 13.749872] ? __pfx_read_tsc+0x10/0x10 [ 13.749902] ? ktime_get_ts64+0x86/0x230 [ 13.749926] kunit_try_run_case+0x1a5/0x480 [ 13.749949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.749980] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.750002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.750024] ? __kthread_parkme+0x82/0x180 [ 13.750044] ? preempt_count_sub+0x50/0x80 [ 13.750068] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.750100] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.750123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.750146] kthread+0x337/0x6f0 [ 13.750175] ? trace_preempt_on+0x20/0xc0 [ 13.750199] ? __pfx_kthread+0x10/0x10 [ 13.750229] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.750249] ? calculate_sigpending+0x7b/0xa0 [ 13.750275] ? __pfx_kthread+0x10/0x10 [ 13.750296] ret_from_fork+0x116/0x1d0 [ 13.750315] ? __pfx_kthread+0x10/0x10 [ 13.750336] ret_from_fork_asm+0x1a/0x30 [ 13.750366] </TASK> [ 13.750377] [ 13.760344] Allocated by task 291: [ 13.760749] kasan_save_stack+0x45/0x70 [ 13.760946] kasan_save_track+0x18/0x40 [ 13.761271] kasan_save_alloc_info+0x3b/0x50 [ 13.761562] __kasan_kmalloc+0xb7/0xc0 [ 13.761709] __kmalloc_cache_noprof+0x189/0x420 [ 13.762051] kasan_atomics+0x95/0x310 [ 13.762284] kunit_try_run_case+0x1a5/0x480 [ 13.762629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.762862] kthread+0x337/0x6f0 [ 13.763038] ret_from_fork+0x116/0x1d0 [ 13.763359] ret_from_fork_asm+0x1a/0x30 [ 13.763638] [ 13.763726] The buggy address belongs to the object at ffff8881029e2200 [ 13.763726] which belongs to the cache kmalloc-64 of size 64 [ 13.764527] The buggy address is located 0 bytes to the right of [ 13.764527] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.765128] [ 13.765224] The buggy address belongs to the physical page: [ 13.765551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.766060] flags: 0x200000000000000(node=0|zone=2) [ 13.766379] page_type: f5(slab) [ 13.766534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.766848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.767151] page dumped because: kasan: bad access detected [ 13.767686] [ 13.767771] Memory state around the buggy address: [ 13.768125] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.768576] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.768982] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.769248] ^ [ 13.769672] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.769973] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.770401] ================================================================== [ 14.794154] ================================================================== [ 14.794542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 14.794866] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.795196] [ 14.795304] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.795350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.795363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.795384] Call Trace: [ 14.795410] <TASK> [ 14.795425] dump_stack_lvl+0x73/0xb0 [ 14.795451] print_report+0xd1/0x650 [ 14.795486] ? __virt_addr_valid+0x1db/0x2d0 [ 14.795510] ? kasan_atomics_helper+0x218a/0x5450 [ 14.795534] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.795561] ? kasan_atomics_helper+0x218a/0x5450 [ 14.795592] kasan_report+0x141/0x180 [ 14.795614] ? kasan_atomics_helper+0x218a/0x5450 [ 14.795652] kasan_check_range+0x10c/0x1c0 [ 14.795676] __kasan_check_write+0x18/0x20 [ 14.795699] kasan_atomics_helper+0x218a/0x5450 [ 14.795730] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.795752] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.795777] ? kasan_atomics+0x152/0x310 [ 14.795813] kasan_atomics+0x1dc/0x310 [ 14.795835] ? __pfx_kasan_atomics+0x10/0x10 [ 14.795859] ? __pfx_read_tsc+0x10/0x10 [ 14.795880] ? ktime_get_ts64+0x86/0x230 [ 14.795914] kunit_try_run_case+0x1a5/0x480 [ 14.795937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.795969] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.795991] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.796014] ? __kthread_parkme+0x82/0x180 [ 14.796043] ? preempt_count_sub+0x50/0x80 [ 14.796067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.796091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.796123] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.796147] kthread+0x337/0x6f0 [ 14.796192] ? trace_preempt_on+0x20/0xc0 [ 14.796223] ? __pfx_kthread+0x10/0x10 [ 14.796244] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.796275] ? calculate_sigpending+0x7b/0xa0 [ 14.796298] ? __pfx_kthread+0x10/0x10 [ 14.796321] ret_from_fork+0x116/0x1d0 [ 14.796340] ? __pfx_kthread+0x10/0x10 [ 14.796369] ret_from_fork_asm+0x1a/0x30 [ 14.796399] </TASK> [ 14.796410] [ 14.807920] Allocated by task 291: [ 14.808304] kasan_save_stack+0x45/0x70 [ 14.808686] kasan_save_track+0x18/0x40 [ 14.808962] kasan_save_alloc_info+0x3b/0x50 [ 14.809341] __kasan_kmalloc+0xb7/0xc0 [ 14.809469] __kmalloc_cache_noprof+0x189/0x420 [ 14.809612] kasan_atomics+0x95/0x310 [ 14.809735] kunit_try_run_case+0x1a5/0x480 [ 14.809871] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.810032] kthread+0x337/0x6f0 [ 14.810141] ret_from_fork+0x116/0x1d0 [ 14.810522] ret_from_fork_asm+0x1a/0x30 [ 14.810869] [ 14.811045] The buggy address belongs to the object at ffff8881029e2200 [ 14.811045] which belongs to the cache kmalloc-64 of size 64 [ 14.812131] The buggy address is located 0 bytes to the right of [ 14.812131] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.813270] [ 14.813421] The buggy address belongs to the physical page: [ 14.813923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.814646] flags: 0x200000000000000(node=0|zone=2) [ 14.815099] page_type: f5(slab) [ 14.815451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.815895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.816120] page dumped because: kasan: bad access detected [ 14.816619] [ 14.816773] Memory state around the buggy address: [ 14.817284] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.817902] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.818542] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.818917] ^ [ 14.819067] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.819563] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.820211] ================================================================== [ 13.771109] ================================================================== [ 13.771757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 13.772167] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.772567] [ 13.772659] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.772705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.772719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.772741] Call Trace: [ 13.772758] <TASK> [ 13.772773] dump_stack_lvl+0x73/0xb0 [ 13.772800] print_report+0xd1/0x650 [ 13.772822] ? __virt_addr_valid+0x1db/0x2d0 [ 13.772844] ? kasan_atomics_helper+0x697/0x5450 [ 13.772865] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.772890] ? kasan_atomics_helper+0x697/0x5450 [ 13.772912] kasan_report+0x141/0x180 [ 13.772933] ? kasan_atomics_helper+0x697/0x5450 [ 13.772959] kasan_check_range+0x10c/0x1c0 [ 13.772981] __kasan_check_write+0x18/0x20 [ 13.773004] kasan_atomics_helper+0x697/0x5450 [ 13.773026] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.773048] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.773071] ? kasan_atomics+0x152/0x310 [ 13.773096] kasan_atomics+0x1dc/0x310 [ 13.773118] ? __pfx_kasan_atomics+0x10/0x10 [ 13.773142] ? __pfx_read_tsc+0x10/0x10 [ 13.773162] ? ktime_get_ts64+0x86/0x230 [ 13.773186] kunit_try_run_case+0x1a5/0x480 [ 13.773221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.773243] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.773264] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.773287] ? __kthread_parkme+0x82/0x180 [ 13.773308] ? preempt_count_sub+0x50/0x80 [ 13.773330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.773354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.773376] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.773399] kthread+0x337/0x6f0 [ 13.773418] ? trace_preempt_on+0x20/0xc0 [ 13.773443] ? __pfx_kthread+0x10/0x10 [ 13.773463] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.773484] ? calculate_sigpending+0x7b/0xa0 [ 13.773509] ? __pfx_kthread+0x10/0x10 [ 13.773530] ret_from_fork+0x116/0x1d0 [ 13.773548] ? __pfx_kthread+0x10/0x10 [ 13.773569] ret_from_fork_asm+0x1a/0x30 [ 13.773599] </TASK> [ 13.773609] [ 13.780627] Allocated by task 291: [ 13.780797] kasan_save_stack+0x45/0x70 [ 13.780985] kasan_save_track+0x18/0x40 [ 13.781164] kasan_save_alloc_info+0x3b/0x50 [ 13.781353] __kasan_kmalloc+0xb7/0xc0 [ 13.781479] __kmalloc_cache_noprof+0x189/0x420 [ 13.781627] kasan_atomics+0x95/0x310 [ 13.781751] kunit_try_run_case+0x1a5/0x480 [ 13.781954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.782220] kthread+0x337/0x6f0 [ 13.782387] ret_from_fork+0x116/0x1d0 [ 13.782539] ret_from_fork_asm+0x1a/0x30 [ 13.782708] [ 13.782771] The buggy address belongs to the object at ffff8881029e2200 [ 13.782771] which belongs to the cache kmalloc-64 of size 64 [ 13.783293] The buggy address is located 0 bytes to the right of [ 13.783293] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.783705] [ 13.783786] The buggy address belongs to the physical page: [ 13.783952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.784184] flags: 0x200000000000000(node=0|zone=2) [ 13.784511] page_type: f5(slab) [ 13.784698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.785021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.785378] page dumped because: kasan: bad access detected [ 13.785617] [ 13.785701] Memory state around the buggy address: [ 13.785912] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.786250] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.786463] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.786669] ^ [ 13.786820] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.787138] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.787510] ================================================================== [ 13.627737] ================================================================== [ 13.628069] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 13.628712] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.629044] [ 13.629125] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.629192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.629214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.629235] Call Trace: [ 13.629250] <TASK> [ 13.629264] dump_stack_lvl+0x73/0xb0 [ 13.629292] print_report+0xd1/0x650 [ 13.629314] ? __virt_addr_valid+0x1db/0x2d0 [ 13.629336] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.629357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.629383] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.629406] kasan_report+0x141/0x180 [ 13.629427] ? kasan_atomics_helper+0x4b6e/0x5450 [ 13.629452] __asan_report_store4_noabort+0x1b/0x30 [ 13.629477] kasan_atomics_helper+0x4b6e/0x5450 [ 13.629500] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.629522] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.629546] ? kasan_atomics+0x152/0x310 [ 13.629571] kasan_atomics+0x1dc/0x310 [ 13.629594] ? __pfx_kasan_atomics+0x10/0x10 [ 13.629618] ? __pfx_read_tsc+0x10/0x10 [ 13.629639] ? ktime_get_ts64+0x86/0x230 [ 13.629664] kunit_try_run_case+0x1a5/0x480 [ 13.629687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.629710] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.629733] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.629755] ? __kthread_parkme+0x82/0x180 [ 13.629777] ? preempt_count_sub+0x50/0x80 [ 13.629800] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.629824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.629846] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.629870] kthread+0x337/0x6f0 [ 13.629889] ? trace_preempt_on+0x20/0xc0 [ 13.629913] ? __pfx_kthread+0x10/0x10 [ 13.629934] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.629955] ? calculate_sigpending+0x7b/0xa0 [ 13.629978] ? __pfx_kthread+0x10/0x10 [ 13.630000] ret_from_fork+0x116/0x1d0 [ 13.630019] ? __pfx_kthread+0x10/0x10 [ 13.630040] ret_from_fork_asm+0x1a/0x30 [ 13.630070] </TASK> [ 13.630081] [ 13.636658] Allocated by task 291: [ 13.636819] kasan_save_stack+0x45/0x70 [ 13.636971] kasan_save_track+0x18/0x40 [ 13.637095] kasan_save_alloc_info+0x3b/0x50 [ 13.637266] __kasan_kmalloc+0xb7/0xc0 [ 13.637391] __kmalloc_cache_noprof+0x189/0x420 [ 13.637540] kasan_atomics+0x95/0x310 [ 13.637714] kunit_try_run_case+0x1a5/0x480 [ 13.637914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.638153] kthread+0x337/0x6f0 [ 13.638338] ret_from_fork+0x116/0x1d0 [ 13.638515] ret_from_fork_asm+0x1a/0x30 [ 13.638708] [ 13.638797] The buggy address belongs to the object at ffff8881029e2200 [ 13.638797] which belongs to the cache kmalloc-64 of size 64 [ 13.639348] The buggy address is located 0 bytes to the right of [ 13.639348] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.639785] [ 13.639870] The buggy address belongs to the physical page: [ 13.640113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.640388] flags: 0x200000000000000(node=0|zone=2) [ 13.640540] page_type: f5(slab) [ 13.640654] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.640870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.641154] page dumped because: kasan: bad access detected [ 13.641417] [ 13.641500] Memory state around the buggy address: [ 13.641709] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.642007] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.642311] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.642551] ^ [ 13.642693] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.642893] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.643099] ================================================================== [ 13.722045] ================================================================== [ 13.723467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 13.723931] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.724243] [ 13.724346] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.724392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.724405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.724427] Call Trace: [ 13.724439] <TASK> [ 13.724453] dump_stack_lvl+0x73/0xb0 [ 13.724480] print_report+0xd1/0x650 [ 13.724502] ? __virt_addr_valid+0x1db/0x2d0 [ 13.724525] ? kasan_atomics_helper+0x565/0x5450 [ 13.724546] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.724572] ? kasan_atomics_helper+0x565/0x5450 [ 13.724594] kasan_report+0x141/0x180 [ 13.724615] ? kasan_atomics_helper+0x565/0x5450 [ 13.724641] kasan_check_range+0x10c/0x1c0 [ 13.724669] __kasan_check_write+0x18/0x20 [ 13.724691] kasan_atomics_helper+0x565/0x5450 [ 13.724714] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.724736] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.724760] ? kasan_atomics+0x152/0x310 [ 13.724786] kasan_atomics+0x1dc/0x310 [ 13.724808] ? __pfx_kasan_atomics+0x10/0x10 [ 13.724832] ? __pfx_read_tsc+0x10/0x10 [ 13.724853] ? ktime_get_ts64+0x86/0x230 [ 13.724877] kunit_try_run_case+0x1a5/0x480 [ 13.724901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.724924] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.724946] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.724968] ? __kthread_parkme+0x82/0x180 [ 13.724988] ? preempt_count_sub+0x50/0x80 [ 13.725011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.725034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.725057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.725079] kthread+0x337/0x6f0 [ 13.725099] ? trace_preempt_on+0x20/0xc0 [ 13.725122] ? __pfx_kthread+0x10/0x10 [ 13.725143] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.725163] ? calculate_sigpending+0x7b/0xa0 [ 13.725187] ? __pfx_kthread+0x10/0x10 [ 13.725426] ret_from_fork+0x116/0x1d0 [ 13.725453] ? __pfx_kthread+0x10/0x10 [ 13.725476] ret_from_fork_asm+0x1a/0x30 [ 13.725521] </TASK> [ 13.725532] [ 13.736686] Allocated by task 291: [ 13.736991] kasan_save_stack+0x45/0x70 [ 13.737360] kasan_save_track+0x18/0x40 [ 13.737538] kasan_save_alloc_info+0x3b/0x50 [ 13.737713] __kasan_kmalloc+0xb7/0xc0 [ 13.737866] __kmalloc_cache_noprof+0x189/0x420 [ 13.738056] kasan_atomics+0x95/0x310 [ 13.738267] kunit_try_run_case+0x1a5/0x480 [ 13.738448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.738661] kthread+0x337/0x6f0 [ 13.738807] ret_from_fork+0x116/0x1d0 [ 13.738970] ret_from_fork_asm+0x1a/0x30 [ 13.739140] [ 13.739665] The buggy address belongs to the object at ffff8881029e2200 [ 13.739665] which belongs to the cache kmalloc-64 of size 64 [ 13.740545] The buggy address is located 0 bytes to the right of [ 13.740545] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.741361] [ 13.741584] The buggy address belongs to the physical page: [ 13.742003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.742595] flags: 0x200000000000000(node=0|zone=2) [ 13.742943] page_type: f5(slab) [ 13.743312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.743808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.744406] page dumped because: kasan: bad access detected [ 13.744634] [ 13.744717] Memory state around the buggy address: [ 13.744913] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.745189] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.745452] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.745754] ^ [ 13.745952] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.746180] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.746526] ================================================================== [ 13.926682] ================================================================== [ 13.926924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 13.927148] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.928190] [ 13.928415] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.928473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.928486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.928508] Call Trace: [ 13.928525] <TASK> [ 13.928541] dump_stack_lvl+0x73/0xb0 [ 13.928569] print_report+0xd1/0x650 [ 13.928592] ? __virt_addr_valid+0x1db/0x2d0 [ 13.928615] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.928636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.928665] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.928686] kasan_report+0x141/0x180 [ 13.928709] ? kasan_atomics_helper+0xb6a/0x5450 [ 13.928735] kasan_check_range+0x10c/0x1c0 [ 13.928757] __kasan_check_write+0x18/0x20 [ 13.928781] kasan_atomics_helper+0xb6a/0x5450 [ 13.928803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.928825] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.928850] ? kasan_atomics+0x152/0x310 [ 13.928875] kasan_atomics+0x1dc/0x310 [ 13.928897] ? __pfx_kasan_atomics+0x10/0x10 [ 13.928920] ? __pfx_read_tsc+0x10/0x10 [ 13.928942] ? ktime_get_ts64+0x86/0x230 [ 13.928966] kunit_try_run_case+0x1a5/0x480 [ 13.928990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.929011] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.929035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.929058] ? __kthread_parkme+0x82/0x180 [ 13.929078] ? preempt_count_sub+0x50/0x80 [ 13.929102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.929125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.929148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.929171] kthread+0x337/0x6f0 [ 13.929191] ? trace_preempt_on+0x20/0xc0 [ 13.929226] ? __pfx_kthread+0x10/0x10 [ 13.929247] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.929267] ? calculate_sigpending+0x7b/0xa0 [ 13.929291] ? __pfx_kthread+0x10/0x10 [ 13.929312] ret_from_fork+0x116/0x1d0 [ 13.929331] ? __pfx_kthread+0x10/0x10 [ 13.929351] ret_from_fork_asm+0x1a/0x30 [ 13.929382] </TASK> [ 13.929393] [ 13.939685] Allocated by task 291: [ 13.939883] kasan_save_stack+0x45/0x70 [ 13.940077] kasan_save_track+0x18/0x40 [ 13.940529] kasan_save_alloc_info+0x3b/0x50 [ 13.940816] __kasan_kmalloc+0xb7/0xc0 [ 13.941089] __kmalloc_cache_noprof+0x189/0x420 [ 13.941470] kasan_atomics+0x95/0x310 [ 13.941656] kunit_try_run_case+0x1a5/0x480 [ 13.941842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.942066] kthread+0x337/0x6f0 [ 13.942490] ret_from_fork+0x116/0x1d0 [ 13.942723] ret_from_fork_asm+0x1a/0x30 [ 13.943022] [ 13.943248] The buggy address belongs to the object at ffff8881029e2200 [ 13.943248] which belongs to the cache kmalloc-64 of size 64 [ 13.943987] The buggy address is located 0 bytes to the right of [ 13.943987] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.944714] [ 13.944812] The buggy address belongs to the physical page: [ 13.945041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.945757] flags: 0x200000000000000(node=0|zone=2) [ 13.946028] page_type: f5(slab) [ 13.946313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.946804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.947475] page dumped because: kasan: bad access detected [ 13.947711] [ 13.947793] Memory state around the buggy address: [ 13.947986] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.948529] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.948987] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.949497] ^ [ 13.949932] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.950354] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.950755] ================================================================== [ 14.376853] ================================================================== [ 14.377419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 14.377782] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.378103] [ 14.378199] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.378253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.378265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.378286] Call Trace: [ 14.378301] <TASK> [ 14.378315] dump_stack_lvl+0x73/0xb0 [ 14.378340] print_report+0xd1/0x650 [ 14.378372] ? __virt_addr_valid+0x1db/0x2d0 [ 14.378395] ? kasan_atomics_helper+0x151d/0x5450 [ 14.378416] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.378452] ? kasan_atomics_helper+0x151d/0x5450 [ 14.378475] kasan_report+0x141/0x180 [ 14.378496] ? kasan_atomics_helper+0x151d/0x5450 [ 14.378522] kasan_check_range+0x10c/0x1c0 [ 14.378554] __kasan_check_write+0x18/0x20 [ 14.378577] kasan_atomics_helper+0x151d/0x5450 [ 14.378609] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.378632] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.378656] ? kasan_atomics+0x152/0x310 [ 14.378682] kasan_atomics+0x1dc/0x310 [ 14.378704] ? __pfx_kasan_atomics+0x10/0x10 [ 14.378728] ? __pfx_read_tsc+0x10/0x10 [ 14.378750] ? ktime_get_ts64+0x86/0x230 [ 14.378774] kunit_try_run_case+0x1a5/0x480 [ 14.378798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.378820] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.378849] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.378871] ? __kthread_parkme+0x82/0x180 [ 14.378892] ? preempt_count_sub+0x50/0x80 [ 14.378926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.378950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.378973] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.378997] kthread+0x337/0x6f0 [ 14.379016] ? trace_preempt_on+0x20/0xc0 [ 14.379039] ? __pfx_kthread+0x10/0x10 [ 14.379059] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.379080] ? calculate_sigpending+0x7b/0xa0 [ 14.379104] ? __pfx_kthread+0x10/0x10 [ 14.379126] ret_from_fork+0x116/0x1d0 [ 14.379145] ? __pfx_kthread+0x10/0x10 [ 14.379165] ret_from_fork_asm+0x1a/0x30 [ 14.379195] </TASK> [ 14.379213] [ 14.386369] Allocated by task 291: [ 14.386565] kasan_save_stack+0x45/0x70 [ 14.386778] kasan_save_track+0x18/0x40 [ 14.386970] kasan_save_alloc_info+0x3b/0x50 [ 14.387143] __kasan_kmalloc+0xb7/0xc0 [ 14.387337] __kmalloc_cache_noprof+0x189/0x420 [ 14.387550] kasan_atomics+0x95/0x310 [ 14.387735] kunit_try_run_case+0x1a5/0x480 [ 14.387932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.388100] kthread+0x337/0x6f0 [ 14.388263] ret_from_fork+0x116/0x1d0 [ 14.388441] ret_from_fork_asm+0x1a/0x30 [ 14.388662] [ 14.388749] The buggy address belongs to the object at ffff8881029e2200 [ 14.388749] which belongs to the cache kmalloc-64 of size 64 [ 14.389152] The buggy address is located 0 bytes to the right of [ 14.389152] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.389694] [ 14.389804] The buggy address belongs to the physical page: [ 14.390008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.390355] flags: 0x200000000000000(node=0|zone=2) [ 14.390588] page_type: f5(slab) [ 14.390738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.391055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.391322] page dumped because: kasan: bad access detected [ 14.391488] [ 14.391550] Memory state around the buggy address: [ 14.391697] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.391924] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.392279] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.392582] ^ [ 14.392795] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.393100] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.393342] ================================================================== [ 14.592486] ================================================================== [ 14.593450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 14.594082] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.594742] [ 14.594910] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.594956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.594968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.594990] Call Trace: [ 14.595005] <TASK> [ 14.595020] dump_stack_lvl+0x73/0xb0 [ 14.595045] print_report+0xd1/0x650 [ 14.595067] ? __virt_addr_valid+0x1db/0x2d0 [ 14.595089] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.595110] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.595136] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.595157] kasan_report+0x141/0x180 [ 14.595179] ? kasan_atomics_helper+0x4f30/0x5450 [ 14.595216] __asan_report_load8_noabort+0x18/0x20 [ 14.595240] kasan_atomics_helper+0x4f30/0x5450 [ 14.595262] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.595284] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.595309] ? kasan_atomics+0x152/0x310 [ 14.595334] kasan_atomics+0x1dc/0x310 [ 14.595356] ? __pfx_kasan_atomics+0x10/0x10 [ 14.595379] ? __pfx_read_tsc+0x10/0x10 [ 14.595400] ? ktime_get_ts64+0x86/0x230 [ 14.595424] kunit_try_run_case+0x1a5/0x480 [ 14.595447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.595468] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.595490] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.595512] ? __kthread_parkme+0x82/0x180 [ 14.595532] ? preempt_count_sub+0x50/0x80 [ 14.595555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.595578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.595601] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.595624] kthread+0x337/0x6f0 [ 14.595642] ? trace_preempt_on+0x20/0xc0 [ 14.595665] ? __pfx_kthread+0x10/0x10 [ 14.595685] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.595706] ? calculate_sigpending+0x7b/0xa0 [ 14.595728] ? __pfx_kthread+0x10/0x10 [ 14.595750] ret_from_fork+0x116/0x1d0 [ 14.595769] ? __pfx_kthread+0x10/0x10 [ 14.595789] ret_from_fork_asm+0x1a/0x30 [ 14.595820] </TASK> [ 14.595831] [ 14.603381] Allocated by task 291: [ 14.603556] kasan_save_stack+0x45/0x70 [ 14.603734] kasan_save_track+0x18/0x40 [ 14.603902] kasan_save_alloc_info+0x3b/0x50 [ 14.604042] __kasan_kmalloc+0xb7/0xc0 [ 14.604167] __kmalloc_cache_noprof+0x189/0x420 [ 14.604383] kasan_atomics+0x95/0x310 [ 14.604565] kunit_try_run_case+0x1a5/0x480 [ 14.604764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.604974] kthread+0x337/0x6f0 [ 14.605121] ret_from_fork+0x116/0x1d0 [ 14.605374] ret_from_fork_asm+0x1a/0x30 [ 14.605538] [ 14.605616] The buggy address belongs to the object at ffff8881029e2200 [ 14.605616] which belongs to the cache kmalloc-64 of size 64 [ 14.606052] The buggy address is located 0 bytes to the right of [ 14.606052] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.606551] [ 14.606625] The buggy address belongs to the physical page: [ 14.606839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.607136] flags: 0x200000000000000(node=0|zone=2) [ 14.607499] page_type: f5(slab) [ 14.607615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.607929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.608149] page dumped because: kasan: bad access detected [ 14.608323] [ 14.608385] Memory state around the buggy address: [ 14.608533] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.608774] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.609078] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.609671] ^ [ 14.609850] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.610061] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.610277] ================================================================== [ 14.694553] ================================================================== [ 14.694816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 14.695045] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.695348] [ 14.695501] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.695546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.695577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.695599] Call Trace: [ 14.695625] <TASK> [ 14.695640] dump_stack_lvl+0x73/0xb0 [ 14.695666] print_report+0xd1/0x650 [ 14.695688] ? __virt_addr_valid+0x1db/0x2d0 [ 14.695711] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.695732] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.695759] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.695781] kasan_report+0x141/0x180 [ 14.695802] ? kasan_atomics_helper+0x4f71/0x5450 [ 14.695828] __asan_report_load8_noabort+0x18/0x20 [ 14.695852] kasan_atomics_helper+0x4f71/0x5450 [ 14.695874] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.695896] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.695920] ? kasan_atomics+0x152/0x310 [ 14.695946] kasan_atomics+0x1dc/0x310 [ 14.695987] ? __pfx_kasan_atomics+0x10/0x10 [ 14.696011] ? __pfx_read_tsc+0x10/0x10 [ 14.696032] ? ktime_get_ts64+0x86/0x230 [ 14.696056] kunit_try_run_case+0x1a5/0x480 [ 14.696079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.696101] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.696122] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.696145] ? __kthread_parkme+0x82/0x180 [ 14.696185] ? preempt_count_sub+0x50/0x80 [ 14.696218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.696242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.696265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.696288] kthread+0x337/0x6f0 [ 14.696307] ? trace_preempt_on+0x20/0xc0 [ 14.696330] ? __pfx_kthread+0x10/0x10 [ 14.696367] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.696388] ? calculate_sigpending+0x7b/0xa0 [ 14.696413] ? __pfx_kthread+0x10/0x10 [ 14.696434] ret_from_fork+0x116/0x1d0 [ 14.696453] ? __pfx_kthread+0x10/0x10 [ 14.696473] ret_from_fork_asm+0x1a/0x30 [ 14.696503] </TASK> [ 14.696513] [ 14.705563] Allocated by task 291: [ 14.705732] kasan_save_stack+0x45/0x70 [ 14.705918] kasan_save_track+0x18/0x40 [ 14.706090] kasan_save_alloc_info+0x3b/0x50 [ 14.706596] __kasan_kmalloc+0xb7/0xc0 [ 14.707453] __kmalloc_cache_noprof+0x189/0x420 [ 14.707623] kasan_atomics+0x95/0x310 [ 14.707751] kunit_try_run_case+0x1a5/0x480 [ 14.707891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.708058] kthread+0x337/0x6f0 [ 14.708170] ret_from_fork+0x116/0x1d0 [ 14.708321] ret_from_fork_asm+0x1a/0x30 [ 14.708455] [ 14.708520] The buggy address belongs to the object at ffff8881029e2200 [ 14.708520] which belongs to the cache kmalloc-64 of size 64 [ 14.709275] The buggy address is located 0 bytes to the right of [ 14.709275] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.709801] [ 14.709895] The buggy address belongs to the physical page: [ 14.710068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.710665] flags: 0x200000000000000(node=0|zone=2) [ 14.711033] page_type: f5(slab) [ 14.711169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.713648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.714995] page dumped because: kasan: bad access detected [ 14.715855] [ 14.716022] Memory state around the buggy address: [ 14.716715] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.717641] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.718311] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.718529] ^ [ 14.718681] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.718892] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.719099] ================================================================== [ 13.951365] ================================================================== [ 13.951822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 13.952115] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.952440] [ 13.952544] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.952590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.952603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.952625] Call Trace: [ 13.952640] <TASK> [ 13.952658] dump_stack_lvl+0x73/0xb0 [ 13.952685] print_report+0xd1/0x650 [ 13.952707] ? __virt_addr_valid+0x1db/0x2d0 [ 13.952729] ? kasan_atomics_helper+0xc70/0x5450 [ 13.952752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.952778] ? kasan_atomics_helper+0xc70/0x5450 [ 13.952799] kasan_report+0x141/0x180 [ 13.952820] ? kasan_atomics_helper+0xc70/0x5450 [ 13.952846] kasan_check_range+0x10c/0x1c0 [ 13.952869] __kasan_check_write+0x18/0x20 [ 13.952891] kasan_atomics_helper+0xc70/0x5450 [ 13.952913] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.952935] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.952960] ? kasan_atomics+0x152/0x310 [ 13.952985] kasan_atomics+0x1dc/0x310 [ 13.953007] ? __pfx_kasan_atomics+0x10/0x10 [ 13.953030] ? __pfx_read_tsc+0x10/0x10 [ 13.953051] ? ktime_get_ts64+0x86/0x230 [ 13.953076] kunit_try_run_case+0x1a5/0x480 [ 13.953099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.953121] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.953142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.953164] ? __kthread_parkme+0x82/0x180 [ 13.953184] ? preempt_count_sub+0x50/0x80 [ 13.953219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.953243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.953266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.953289] kthread+0x337/0x6f0 [ 13.953309] ? trace_preempt_on+0x20/0xc0 [ 13.953332] ? __pfx_kthread+0x10/0x10 [ 13.953352] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.953373] ? calculate_sigpending+0x7b/0xa0 [ 13.953396] ? __pfx_kthread+0x10/0x10 [ 13.953418] ret_from_fork+0x116/0x1d0 [ 13.953436] ? __pfx_kthread+0x10/0x10 [ 13.953457] ret_from_fork_asm+0x1a/0x30 [ 13.953486] </TASK> [ 13.953498] [ 13.960377] Allocated by task 291: [ 13.960501] kasan_save_stack+0x45/0x70 [ 13.960637] kasan_save_track+0x18/0x40 [ 13.960821] kasan_save_alloc_info+0x3b/0x50 [ 13.961021] __kasan_kmalloc+0xb7/0xc0 [ 13.961198] __kmalloc_cache_noprof+0x189/0x420 [ 13.961415] kasan_atomics+0x95/0x310 [ 13.961590] kunit_try_run_case+0x1a5/0x480 [ 13.961784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.961982] kthread+0x337/0x6f0 [ 13.962097] ret_from_fork+0x116/0x1d0 [ 13.962341] ret_from_fork_asm+0x1a/0x30 [ 13.962530] [ 13.962616] The buggy address belongs to the object at ffff8881029e2200 [ 13.962616] which belongs to the cache kmalloc-64 of size 64 [ 13.963073] The buggy address is located 0 bytes to the right of [ 13.963073] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.963501] [ 13.963567] The buggy address belongs to the physical page: [ 13.963808] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.964149] flags: 0x200000000000000(node=0|zone=2) [ 13.964432] page_type: f5(slab) [ 13.964547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.964776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.964998] page dumped because: kasan: bad access detected [ 13.965187] [ 13.965279] Memory state around the buggy address: [ 13.965492] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.965802] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.966109] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.966360] ^ [ 13.966508] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.966715] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.966920] ================================================================== [ 14.568055] ================================================================== [ 14.568394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 14.568712] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.568929] [ 14.569004] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.569050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.569062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.569083] Call Trace: [ 14.569097] <TASK> [ 14.569112] dump_stack_lvl+0x73/0xb0 [ 14.569136] print_report+0xd1/0x650 [ 14.569157] ? __virt_addr_valid+0x1db/0x2d0 [ 14.569211] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.569233] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.569268] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.569290] kasan_report+0x141/0x180 [ 14.569313] ? kasan_atomics_helper+0x1c18/0x5450 [ 14.569350] kasan_check_range+0x10c/0x1c0 [ 14.569373] __kasan_check_write+0x18/0x20 [ 14.569396] kasan_atomics_helper+0x1c18/0x5450 [ 14.569417] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.569439] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.569463] ? kasan_atomics+0x152/0x310 [ 14.569489] kasan_atomics+0x1dc/0x310 [ 14.569511] ? __pfx_kasan_atomics+0x10/0x10 [ 14.569535] ? __pfx_read_tsc+0x10/0x10 [ 14.569555] ? ktime_get_ts64+0x86/0x230 [ 14.569580] kunit_try_run_case+0x1a5/0x480 [ 14.569603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.569625] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.569646] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.569669] ? __kthread_parkme+0x82/0x180 [ 14.569689] ? preempt_count_sub+0x50/0x80 [ 14.569712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.569735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.569758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.569781] kthread+0x337/0x6f0 [ 14.569800] ? trace_preempt_on+0x20/0xc0 [ 14.569823] ? __pfx_kthread+0x10/0x10 [ 14.569844] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.569865] ? calculate_sigpending+0x7b/0xa0 [ 14.569888] ? __pfx_kthread+0x10/0x10 [ 14.569910] ret_from_fork+0x116/0x1d0 [ 14.569930] ? __pfx_kthread+0x10/0x10 [ 14.569950] ret_from_fork_asm+0x1a/0x30 [ 14.569981] </TASK> [ 14.569991] [ 14.580912] Allocated by task 291: [ 14.581071] kasan_save_stack+0x45/0x70 [ 14.581722] kasan_save_track+0x18/0x40 [ 14.581888] kasan_save_alloc_info+0x3b/0x50 [ 14.582298] __kasan_kmalloc+0xb7/0xc0 [ 14.582464] __kmalloc_cache_noprof+0x189/0x420 [ 14.582802] kasan_atomics+0x95/0x310 [ 14.582986] kunit_try_run_case+0x1a5/0x480 [ 14.583355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.583679] kthread+0x337/0x6f0 [ 14.583818] ret_from_fork+0x116/0x1d0 [ 14.584109] ret_from_fork_asm+0x1a/0x30 [ 14.584351] [ 14.584584] The buggy address belongs to the object at ffff8881029e2200 [ 14.584584] which belongs to the cache kmalloc-64 of size 64 [ 14.585112] The buggy address is located 0 bytes to the right of [ 14.585112] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.585933] [ 14.586015] The buggy address belongs to the physical page: [ 14.586273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.586764] flags: 0x200000000000000(node=0|zone=2) [ 14.587068] page_type: f5(slab) [ 14.587197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.587600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.588062] page dumped because: kasan: bad access detected [ 14.588420] [ 14.588497] Memory state around the buggy address: [ 14.588787] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.589232] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.589913] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.590644] ^ [ 14.590802] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.591013] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.591633] ================================================================== [ 14.020760] ================================================================== [ 14.021083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 14.021408] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.021690] [ 14.021789] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.021833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.021846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.021867] Call Trace: [ 14.021882] <TASK> [ 14.021897] dump_stack_lvl+0x73/0xb0 [ 14.021921] print_report+0xd1/0x650 [ 14.021942] ? __virt_addr_valid+0x1db/0x2d0 [ 14.021965] ? kasan_atomics_helper+0xe78/0x5450 [ 14.021986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.022011] ? kasan_atomics_helper+0xe78/0x5450 [ 14.022033] kasan_report+0x141/0x180 [ 14.022054] ? kasan_atomics_helper+0xe78/0x5450 [ 14.022079] kasan_check_range+0x10c/0x1c0 [ 14.022102] __kasan_check_write+0x18/0x20 [ 14.022126] kasan_atomics_helper+0xe78/0x5450 [ 14.022148] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.022170] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.022196] ? kasan_atomics+0x152/0x310 [ 14.022233] kasan_atomics+0x1dc/0x310 [ 14.022255] ? __pfx_kasan_atomics+0x10/0x10 [ 14.022279] ? __pfx_read_tsc+0x10/0x10 [ 14.022300] ? ktime_get_ts64+0x86/0x230 [ 14.022324] kunit_try_run_case+0x1a5/0x480 [ 14.022347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.022373] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.022397] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.022422] ? __kthread_parkme+0x82/0x180 [ 14.022443] ? preempt_count_sub+0x50/0x80 [ 14.022467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.022491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.022514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.022537] kthread+0x337/0x6f0 [ 14.022557] ? trace_preempt_on+0x20/0xc0 [ 14.022582] ? __pfx_kthread+0x10/0x10 [ 14.022602] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.022622] ? calculate_sigpending+0x7b/0xa0 [ 14.022645] ? __pfx_kthread+0x10/0x10 [ 14.022667] ret_from_fork+0x116/0x1d0 [ 14.022685] ? __pfx_kthread+0x10/0x10 [ 14.022706] ret_from_fork_asm+0x1a/0x30 [ 14.022736] </TASK> [ 14.022747] [ 14.029882] Allocated by task 291: [ 14.030032] kasan_save_stack+0x45/0x70 [ 14.030225] kasan_save_track+0x18/0x40 [ 14.030391] kasan_save_alloc_info+0x3b/0x50 [ 14.030543] __kasan_kmalloc+0xb7/0xc0 [ 14.030669] __kmalloc_cache_noprof+0x189/0x420 [ 14.030870] kasan_atomics+0x95/0x310 [ 14.031044] kunit_try_run_case+0x1a5/0x480 [ 14.031280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.031453] kthread+0x337/0x6f0 [ 14.031581] ret_from_fork+0x116/0x1d0 [ 14.031758] ret_from_fork_asm+0x1a/0x30 [ 14.031947] [ 14.032032] The buggy address belongs to the object at ffff8881029e2200 [ 14.032032] which belongs to the cache kmalloc-64 of size 64 [ 14.032507] The buggy address is located 0 bytes to the right of [ 14.032507] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.032995] [ 14.033070] The buggy address belongs to the physical page: [ 14.033320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.033632] flags: 0x200000000000000(node=0|zone=2) [ 14.033820] page_type: f5(slab) [ 14.033969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.034330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.034620] page dumped because: kasan: bad access detected [ 14.034804] [ 14.034867] Memory state around the buggy address: [ 14.035014] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.035235] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.035443] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.035649] ^ [ 14.035795] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.036100] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.036410] ================================================================== [ 14.199295] ================================================================== [ 14.200572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 14.201465] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.202046] [ 14.202134] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.202182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.202195] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.202229] Call Trace: [ 14.202246] <TASK> [ 14.202261] dump_stack_lvl+0x73/0xb0 [ 14.202289] print_report+0xd1/0x650 [ 14.202310] ? __virt_addr_valid+0x1db/0x2d0 [ 14.202333] ? kasan_atomics_helper+0x1217/0x5450 [ 14.202354] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.202380] ? kasan_atomics_helper+0x1217/0x5450 [ 14.202401] kasan_report+0x141/0x180 [ 14.202423] ? kasan_atomics_helper+0x1217/0x5450 [ 14.202448] kasan_check_range+0x10c/0x1c0 [ 14.202472] __kasan_check_write+0x18/0x20 [ 14.202494] kasan_atomics_helper+0x1217/0x5450 [ 14.202516] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.202538] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.202563] ? kasan_atomics+0x152/0x310 [ 14.202587] kasan_atomics+0x1dc/0x310 [ 14.202611] ? __pfx_kasan_atomics+0x10/0x10 [ 14.202634] ? __pfx_read_tsc+0x10/0x10 [ 14.202655] ? ktime_get_ts64+0x86/0x230 [ 14.202679] kunit_try_run_case+0x1a5/0x480 [ 14.202703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.202725] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.202746] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.202769] ? __kthread_parkme+0x82/0x180 [ 14.202789] ? preempt_count_sub+0x50/0x80 [ 14.202812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.202836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.202859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.202882] kthread+0x337/0x6f0 [ 14.202901] ? trace_preempt_on+0x20/0xc0 [ 14.202924] ? __pfx_kthread+0x10/0x10 [ 14.202945] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.202966] ? calculate_sigpending+0x7b/0xa0 [ 14.202990] ? __pfx_kthread+0x10/0x10 [ 14.203012] ret_from_fork+0x116/0x1d0 [ 14.203031] ? __pfx_kthread+0x10/0x10 [ 14.203052] ret_from_fork_asm+0x1a/0x30 [ 14.203082] </TASK> [ 14.203092] [ 14.213243] Allocated by task 291: [ 14.213425] kasan_save_stack+0x45/0x70 [ 14.213619] kasan_save_track+0x18/0x40 [ 14.213781] kasan_save_alloc_info+0x3b/0x50 [ 14.213961] __kasan_kmalloc+0xb7/0xc0 [ 14.214125] __kmalloc_cache_noprof+0x189/0x420 [ 14.214924] kasan_atomics+0x95/0x310 [ 14.215168] kunit_try_run_case+0x1a5/0x480 [ 14.215471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.215781] kthread+0x337/0x6f0 [ 14.215904] ret_from_fork+0x116/0x1d0 [ 14.216238] ret_from_fork_asm+0x1a/0x30 [ 14.216444] [ 14.216692] The buggy address belongs to the object at ffff8881029e2200 [ 14.216692] which belongs to the cache kmalloc-64 of size 64 [ 14.217350] The buggy address is located 0 bytes to the right of [ 14.217350] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.217932] [ 14.218150] The buggy address belongs to the physical page: [ 14.218368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.218833] flags: 0x200000000000000(node=0|zone=2) [ 14.219147] page_type: f5(slab) [ 14.219282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.219740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.220119] page dumped because: kasan: bad access detected [ 14.220434] [ 14.220659] Memory state around the buggy address: [ 14.220829] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.221303] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.221681] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.221976] ^ [ 14.222349] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.222720] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.223114] ================================================================== [ 14.661523] ================================================================== [ 14.661904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 14.662635] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.662933] [ 14.663011] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.663056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.663069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.663090] Call Trace: [ 14.663104] <TASK> [ 14.663118] dump_stack_lvl+0x73/0xb0 [ 14.663144] print_report+0xd1/0x650 [ 14.663187] ? __virt_addr_valid+0x1db/0x2d0 [ 14.663220] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.663241] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.663266] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.663288] kasan_report+0x141/0x180 [ 14.663310] ? kasan_atomics_helper+0x1eaa/0x5450 [ 14.663336] kasan_check_range+0x10c/0x1c0 [ 14.663359] __kasan_check_write+0x18/0x20 [ 14.663382] kasan_atomics_helper+0x1eaa/0x5450 [ 14.663404] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.663425] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.663450] ? kasan_atomics+0x152/0x310 [ 14.663475] kasan_atomics+0x1dc/0x310 [ 14.663497] ? __pfx_kasan_atomics+0x10/0x10 [ 14.663520] ? __pfx_read_tsc+0x10/0x10 [ 14.663541] ? ktime_get_ts64+0x86/0x230 [ 14.663566] kunit_try_run_case+0x1a5/0x480 [ 14.663589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.663610] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.663632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.663655] ? __kthread_parkme+0x82/0x180 [ 14.663675] ? preempt_count_sub+0x50/0x80 [ 14.663699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.663723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.663745] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.663768] kthread+0x337/0x6f0 [ 14.663787] ? trace_preempt_on+0x20/0xc0 [ 14.663810] ? __pfx_kthread+0x10/0x10 [ 14.663830] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.663851] ? calculate_sigpending+0x7b/0xa0 [ 14.663874] ? __pfx_kthread+0x10/0x10 [ 14.663896] ret_from_fork+0x116/0x1d0 [ 14.663914] ? __pfx_kthread+0x10/0x10 [ 14.663935] ret_from_fork_asm+0x1a/0x30 [ 14.663964] </TASK> [ 14.663975] [ 14.671020] Allocated by task 291: [ 14.671229] kasan_save_stack+0x45/0x70 [ 14.671426] kasan_save_track+0x18/0x40 [ 14.671611] kasan_save_alloc_info+0x3b/0x50 [ 14.671812] __kasan_kmalloc+0xb7/0xc0 [ 14.671991] __kmalloc_cache_noprof+0x189/0x420 [ 14.672211] kasan_atomics+0x95/0x310 [ 14.672346] kunit_try_run_case+0x1a5/0x480 [ 14.672537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.672755] kthread+0x337/0x6f0 [ 14.672866] ret_from_fork+0x116/0x1d0 [ 14.672988] ret_from_fork_asm+0x1a/0x30 [ 14.673115] [ 14.673201] The buggy address belongs to the object at ffff8881029e2200 [ 14.673201] which belongs to the cache kmalloc-64 of size 64 [ 14.673670] The buggy address is located 0 bytes to the right of [ 14.673670] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.674242] [ 14.674333] The buggy address belongs to the physical page: [ 14.674595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.674865] flags: 0x200000000000000(node=0|zone=2) [ 14.675015] page_type: f5(slab) [ 14.675125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.675379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.675671] page dumped because: kasan: bad access detected [ 14.675927] [ 14.676011] Memory state around the buggy address: [ 14.676263] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.676586] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.676910] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.677255] ^ [ 14.677474] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.677678] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.677925] ================================================================== [ 14.644516] ================================================================== [ 14.645250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 14.645794] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.646007] [ 14.646085] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.646131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.646143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.646165] Call Trace: [ 14.646186] <TASK> [ 14.646200] dump_stack_lvl+0x73/0xb0 [ 14.646234] print_report+0xd1/0x650 [ 14.646256] ? __virt_addr_valid+0x1db/0x2d0 [ 14.646278] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.646301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.646327] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.646348] kasan_report+0x141/0x180 [ 14.646370] ? kasan_atomics_helper+0x1e12/0x5450 [ 14.646396] kasan_check_range+0x10c/0x1c0 [ 14.646420] __kasan_check_write+0x18/0x20 [ 14.646443] kasan_atomics_helper+0x1e12/0x5450 [ 14.646465] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.646486] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.646510] ? kasan_atomics+0x152/0x310 [ 14.646537] kasan_atomics+0x1dc/0x310 [ 14.646559] ? __pfx_kasan_atomics+0x10/0x10 [ 14.646584] ? __pfx_read_tsc+0x10/0x10 [ 14.646605] ? ktime_get_ts64+0x86/0x230 [ 14.646629] kunit_try_run_case+0x1a5/0x480 [ 14.646652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.646675] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.646697] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.646718] ? __kthread_parkme+0x82/0x180 [ 14.646738] ? preempt_count_sub+0x50/0x80 [ 14.646762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.646784] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.646807] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.646830] kthread+0x337/0x6f0 [ 14.646849] ? trace_preempt_on+0x20/0xc0 [ 14.646871] ? __pfx_kthread+0x10/0x10 [ 14.646892] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.646912] ? calculate_sigpending+0x7b/0xa0 [ 14.646936] ? __pfx_kthread+0x10/0x10 [ 14.646957] ret_from_fork+0x116/0x1d0 [ 14.646975] ? __pfx_kthread+0x10/0x10 [ 14.646996] ret_from_fork_asm+0x1a/0x30 [ 14.647026] </TASK> [ 14.647036] [ 14.654377] Allocated by task 291: [ 14.654547] kasan_save_stack+0x45/0x70 [ 14.654689] kasan_save_track+0x18/0x40 [ 14.654890] kasan_save_alloc_info+0x3b/0x50 [ 14.655037] __kasan_kmalloc+0xb7/0xc0 [ 14.655159] __kmalloc_cache_noprof+0x189/0x420 [ 14.655398] kasan_atomics+0x95/0x310 [ 14.655578] kunit_try_run_case+0x1a5/0x480 [ 14.655799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.656042] kthread+0x337/0x6f0 [ 14.656248] ret_from_fork+0x116/0x1d0 [ 14.656375] ret_from_fork_asm+0x1a/0x30 [ 14.656503] [ 14.656566] The buggy address belongs to the object at ffff8881029e2200 [ 14.656566] which belongs to the cache kmalloc-64 of size 64 [ 14.656992] The buggy address is located 0 bytes to the right of [ 14.656992] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.657545] [ 14.657631] The buggy address belongs to the physical page: [ 14.657866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.658095] flags: 0x200000000000000(node=0|zone=2) [ 14.658338] page_type: f5(slab) [ 14.658500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.658828] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.659068] page dumped because: kasan: bad access detected [ 14.659334] [ 14.659437] Memory state around the buggy address: [ 14.659644] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.659846] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.660080] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.660408] ^ [ 14.660609] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.660818] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.661016] ================================================================== [ 14.759918] ================================================================== [ 14.760530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 14.760836] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.761121] [ 14.761276] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.761322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.761335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.761357] Call Trace: [ 14.761372] <TASK> [ 14.761386] dump_stack_lvl+0x73/0xb0 [ 14.761412] print_report+0xd1/0x650 [ 14.761435] ? __virt_addr_valid+0x1db/0x2d0 [ 14.761457] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.761478] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.761504] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.761525] kasan_report+0x141/0x180 [ 14.761547] ? kasan_atomics_helper+0x20c8/0x5450 [ 14.761573] kasan_check_range+0x10c/0x1c0 [ 14.761595] __kasan_check_write+0x18/0x20 [ 14.761630] kasan_atomics_helper+0x20c8/0x5450 [ 14.761652] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.761675] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.761710] ? kasan_atomics+0x152/0x310 [ 14.761735] kasan_atomics+0x1dc/0x310 [ 14.761758] ? __pfx_kasan_atomics+0x10/0x10 [ 14.761781] ? __pfx_read_tsc+0x10/0x10 [ 14.761802] ? ktime_get_ts64+0x86/0x230 [ 14.761826] kunit_try_run_case+0x1a5/0x480 [ 14.761850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.761872] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.761894] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.761925] ? __kthread_parkme+0x82/0x180 [ 14.761946] ? preempt_count_sub+0x50/0x80 [ 14.761969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.762002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.762024] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.762048] kthread+0x337/0x6f0 [ 14.762076] ? trace_preempt_on+0x20/0xc0 [ 14.762099] ? __pfx_kthread+0x10/0x10 [ 14.762120] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.762150] ? calculate_sigpending+0x7b/0xa0 [ 14.762191] ? __pfx_kthread+0x10/0x10 [ 14.762230] ret_from_fork+0x116/0x1d0 [ 14.762251] ? __pfx_kthread+0x10/0x10 [ 14.762274] ret_from_fork_asm+0x1a/0x30 [ 14.762316] </TASK> [ 14.762327] [ 14.769582] Allocated by task 291: [ 14.769747] kasan_save_stack+0x45/0x70 [ 14.769943] kasan_save_track+0x18/0x40 [ 14.770117] kasan_save_alloc_info+0x3b/0x50 [ 14.770321] __kasan_kmalloc+0xb7/0xc0 [ 14.770450] __kmalloc_cache_noprof+0x189/0x420 [ 14.770598] kasan_atomics+0x95/0x310 [ 14.770723] kunit_try_run_case+0x1a5/0x480 [ 14.770861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.771027] kthread+0x337/0x6f0 [ 14.771144] ret_from_fork+0x116/0x1d0 [ 14.771367] ret_from_fork_asm+0x1a/0x30 [ 14.771553] [ 14.771638] The buggy address belongs to the object at ffff8881029e2200 [ 14.771638] which belongs to the cache kmalloc-64 of size 64 [ 14.772143] The buggy address is located 0 bytes to the right of [ 14.772143] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.772680] [ 14.772746] The buggy address belongs to the physical page: [ 14.772911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.773142] flags: 0x200000000000000(node=0|zone=2) [ 14.773322] page_type: f5(slab) [ 14.773476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.773830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.774154] page dumped because: kasan: bad access detected [ 14.774434] [ 14.774522] Memory state around the buggy address: [ 14.774733] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.775064] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.775402] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.775707] ^ [ 14.775913] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.776182] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.776451] ================================================================== [ 13.904841] ================================================================== [ 13.905065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 13.905360] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.905746] [ 13.905846] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.905891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.905904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.905925] Call Trace: [ 13.905940] <TASK> [ 13.905954] dump_stack_lvl+0x73/0xb0 [ 13.905979] print_report+0xd1/0x650 [ 13.906000] ? __virt_addr_valid+0x1db/0x2d0 [ 13.906023] ? kasan_atomics_helper+0xac7/0x5450 [ 13.906043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.906068] ? kasan_atomics_helper+0xac7/0x5450 [ 13.906089] kasan_report+0x141/0x180 [ 13.906110] ? kasan_atomics_helper+0xac7/0x5450 [ 13.906135] kasan_check_range+0x10c/0x1c0 [ 13.906159] __kasan_check_write+0x18/0x20 [ 13.906196] kasan_atomics_helper+0xac7/0x5450 [ 13.906255] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.906278] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.906303] ? kasan_atomics+0x152/0x310 [ 13.906328] kasan_atomics+0x1dc/0x310 [ 13.906350] ? __pfx_kasan_atomics+0x10/0x10 [ 13.906374] ? __pfx_read_tsc+0x10/0x10 [ 13.906396] ? ktime_get_ts64+0x86/0x230 [ 13.906421] kunit_try_run_case+0x1a5/0x480 [ 13.906444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.906485] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.906507] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.906541] ? __kthread_parkme+0x82/0x180 [ 13.906562] ? preempt_count_sub+0x50/0x80 [ 13.906586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.906610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.906634] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.906657] kthread+0x337/0x6f0 [ 13.906676] ? trace_preempt_on+0x20/0xc0 [ 13.906700] ? __pfx_kthread+0x10/0x10 [ 13.906720] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.906741] ? calculate_sigpending+0x7b/0xa0 [ 13.906765] ? __pfx_kthread+0x10/0x10 [ 13.906786] ret_from_fork+0x116/0x1d0 [ 13.906804] ? __pfx_kthread+0x10/0x10 [ 13.906825] ret_from_fork_asm+0x1a/0x30 [ 13.906856] </TASK> [ 13.906866] [ 13.916155] Allocated by task 291: [ 13.916333] kasan_save_stack+0x45/0x70 [ 13.916512] kasan_save_track+0x18/0x40 [ 13.916689] kasan_save_alloc_info+0x3b/0x50 [ 13.916882] __kasan_kmalloc+0xb7/0xc0 [ 13.917048] __kmalloc_cache_noprof+0x189/0x420 [ 13.917716] kasan_atomics+0x95/0x310 [ 13.917916] kunit_try_run_case+0x1a5/0x480 [ 13.918324] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.918748] kthread+0x337/0x6f0 [ 13.919022] ret_from_fork+0x116/0x1d0 [ 13.919324] ret_from_fork_asm+0x1a/0x30 [ 13.919616] [ 13.919806] The buggy address belongs to the object at ffff8881029e2200 [ 13.919806] which belongs to the cache kmalloc-64 of size 64 [ 13.920546] The buggy address is located 0 bytes to the right of [ 13.920546] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.921595] [ 13.921696] The buggy address belongs to the physical page: [ 13.922039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.922339] flags: 0x200000000000000(node=0|zone=2) [ 13.922504] page_type: f5(slab) [ 13.923000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.923448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.923685] page dumped because: kasan: bad access detected [ 13.923854] [ 13.923918] Memory state around the buggy address: [ 13.924066] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.924288] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.924499] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.925003] ^ [ 13.925171] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.925396] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.925870] ================================================================== [ 14.246752] ================================================================== [ 14.247059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 14.247564] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.247853] [ 14.247939] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.247983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.247996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.248018] Call Trace: [ 14.248032] <TASK> [ 14.248046] dump_stack_lvl+0x73/0xb0 [ 14.248072] print_report+0xd1/0x650 [ 14.248093] ? __virt_addr_valid+0x1db/0x2d0 [ 14.248115] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.248136] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.248162] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.248183] kasan_report+0x141/0x180 [ 14.248215] ? kasan_atomics_helper+0x12e6/0x5450 [ 14.248240] kasan_check_range+0x10c/0x1c0 [ 14.248263] __kasan_check_write+0x18/0x20 [ 14.248286] kasan_atomics_helper+0x12e6/0x5450 [ 14.248309] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.248330] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.248354] ? kasan_atomics+0x152/0x310 [ 14.248380] kasan_atomics+0x1dc/0x310 [ 14.248402] ? __pfx_kasan_atomics+0x10/0x10 [ 14.248426] ? __pfx_read_tsc+0x10/0x10 [ 14.248446] ? ktime_get_ts64+0x86/0x230 [ 14.248470] kunit_try_run_case+0x1a5/0x480 [ 14.248494] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.248515] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.248537] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.248559] ? __kthread_parkme+0x82/0x180 [ 14.248580] ? preempt_count_sub+0x50/0x80 [ 14.248603] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.248626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.248652] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.248675] kthread+0x337/0x6f0 [ 14.248695] ? trace_preempt_on+0x20/0xc0 [ 14.248718] ? __pfx_kthread+0x10/0x10 [ 14.248739] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.248759] ? calculate_sigpending+0x7b/0xa0 [ 14.248783] ? __pfx_kthread+0x10/0x10 [ 14.248805] ret_from_fork+0x116/0x1d0 [ 14.248824] ? __pfx_kthread+0x10/0x10 [ 14.248845] ret_from_fork_asm+0x1a/0x30 [ 14.248875] </TASK> [ 14.248886] [ 14.258658] Allocated by task 291: [ 14.258991] kasan_save_stack+0x45/0x70 [ 14.259312] kasan_save_track+0x18/0x40 [ 14.259455] kasan_save_alloc_info+0x3b/0x50 [ 14.259783] __kasan_kmalloc+0xb7/0xc0 [ 14.259965] __kmalloc_cache_noprof+0x189/0x420 [ 14.260325] kasan_atomics+0x95/0x310 [ 14.260502] kunit_try_run_case+0x1a5/0x480 [ 14.260832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.261149] kthread+0x337/0x6f0 [ 14.261283] ret_from_fork+0x116/0x1d0 [ 14.261569] ret_from_fork_asm+0x1a/0x30 [ 14.261855] [ 14.261948] The buggy address belongs to the object at ffff8881029e2200 [ 14.261948] which belongs to the cache kmalloc-64 of size 64 [ 14.262679] The buggy address is located 0 bytes to the right of [ 14.262679] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.263172] [ 14.263247] The buggy address belongs to the physical page: [ 14.263478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.263799] flags: 0x200000000000000(node=0|zone=2) [ 14.264007] page_type: f5(slab) [ 14.264154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.264878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.265297] page dumped because: kasan: bad access detected [ 14.265503] [ 14.265722] Memory state around the buggy address: [ 14.265906] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.266389] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.266742] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.267013] ^ [ 14.267357] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.267717] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.267978] ================================================================== [ 14.153775] ================================================================== [ 14.154124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 14.154498] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.154716] [ 14.154792] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.154836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.154848] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.154870] Call Trace: [ 14.154884] <TASK> [ 14.154898] dump_stack_lvl+0x73/0xb0 [ 14.154924] print_report+0xd1/0x650 [ 14.154944] ? __virt_addr_valid+0x1db/0x2d0 [ 14.154966] ? kasan_atomics_helper+0x1148/0x5450 [ 14.154987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.155013] ? kasan_atomics_helper+0x1148/0x5450 [ 14.155047] kasan_report+0x141/0x180 [ 14.155069] ? kasan_atomics_helper+0x1148/0x5450 [ 14.155105] kasan_check_range+0x10c/0x1c0 [ 14.155129] __kasan_check_write+0x18/0x20 [ 14.155151] kasan_atomics_helper+0x1148/0x5450 [ 14.155174] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.155195] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.155237] ? kasan_atomics+0x152/0x310 [ 14.155262] kasan_atomics+0x1dc/0x310 [ 14.155284] ? __pfx_kasan_atomics+0x10/0x10 [ 14.155318] ? __pfx_read_tsc+0x10/0x10 [ 14.155338] ? ktime_get_ts64+0x86/0x230 [ 14.155363] kunit_try_run_case+0x1a5/0x480 [ 14.155387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.155409] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.155431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.155453] ? __kthread_parkme+0x82/0x180 [ 14.155473] ? preempt_count_sub+0x50/0x80 [ 14.155497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.155520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.155543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.155566] kthread+0x337/0x6f0 [ 14.155585] ? trace_preempt_on+0x20/0xc0 [ 14.155617] ? __pfx_kthread+0x10/0x10 [ 14.155637] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.155658] ? calculate_sigpending+0x7b/0xa0 [ 14.155691] ? __pfx_kthread+0x10/0x10 [ 14.155713] ret_from_fork+0x116/0x1d0 [ 14.155731] ? __pfx_kthread+0x10/0x10 [ 14.155752] ret_from_fork_asm+0x1a/0x30 [ 14.155782] </TASK> [ 14.155792] [ 14.163594] Allocated by task 291: [ 14.163741] kasan_save_stack+0x45/0x70 [ 14.163922] kasan_save_track+0x18/0x40 [ 14.164096] kasan_save_alloc_info+0x3b/0x50 [ 14.164312] __kasan_kmalloc+0xb7/0xc0 [ 14.164439] __kmalloc_cache_noprof+0x189/0x420 [ 14.164586] kasan_atomics+0x95/0x310 [ 14.164713] kunit_try_run_case+0x1a5/0x480 [ 14.164851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.165016] kthread+0x337/0x6f0 [ 14.165130] ret_from_fork+0x116/0x1d0 [ 14.165308] ret_from_fork_asm+0x1a/0x30 [ 14.165538] [ 14.165623] The buggy address belongs to the object at ffff8881029e2200 [ 14.165623] which belongs to the cache kmalloc-64 of size 64 [ 14.166126] The buggy address is located 0 bytes to the right of [ 14.166126] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.166596] [ 14.166672] The buggy address belongs to the physical page: [ 14.166871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.167136] flags: 0x200000000000000(node=0|zone=2) [ 14.167539] page_type: f5(slab) [ 14.167702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.168064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.168463] page dumped because: kasan: bad access detected [ 14.168709] [ 14.168805] Memory state around the buggy address: [ 14.169035] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.169503] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.169715] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.169920] ^ [ 14.170065] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.170296] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.170618] ================================================================== [ 13.660732] ================================================================== [ 13.661263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 13.661750] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.662062] [ 13.662601] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.662687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.662701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.662724] Call Trace: [ 13.662739] <TASK> [ 13.662754] dump_stack_lvl+0x73/0xb0 [ 13.662781] print_report+0xd1/0x650 [ 13.662803] ? __virt_addr_valid+0x1db/0x2d0 [ 13.662825] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.662847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.662874] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.662895] kasan_report+0x141/0x180 [ 13.662917] ? kasan_atomics_helper+0x4b54/0x5450 [ 13.662943] __asan_report_load4_noabort+0x18/0x20 [ 13.662967] kasan_atomics_helper+0x4b54/0x5450 [ 13.662989] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.663012] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.663037] ? kasan_atomics+0x152/0x310 [ 13.663062] kasan_atomics+0x1dc/0x310 [ 13.663085] ? __pfx_kasan_atomics+0x10/0x10 [ 13.663109] ? __pfx_read_tsc+0x10/0x10 [ 13.663130] ? ktime_get_ts64+0x86/0x230 [ 13.663154] kunit_try_run_case+0x1a5/0x480 [ 13.663199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.663231] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.663253] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.663275] ? __kthread_parkme+0x82/0x180 [ 13.663296] ? preempt_count_sub+0x50/0x80 [ 13.663319] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.664240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.664277] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.664303] kthread+0x337/0x6f0 [ 13.664324] ? trace_preempt_on+0x20/0xc0 [ 13.664349] ? __pfx_kthread+0x10/0x10 [ 13.664370] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.664391] ? calculate_sigpending+0x7b/0xa0 [ 13.664414] ? __pfx_kthread+0x10/0x10 [ 13.664436] ret_from_fork+0x116/0x1d0 [ 13.664455] ? __pfx_kthread+0x10/0x10 [ 13.664475] ret_from_fork_asm+0x1a/0x30 [ 13.664506] </TASK> [ 13.664517] [ 13.678440] Allocated by task 291: [ 13.678624] kasan_save_stack+0x45/0x70 [ 13.678782] kasan_save_track+0x18/0x40 [ 13.678986] kasan_save_alloc_info+0x3b/0x50 [ 13.679216] __kasan_kmalloc+0xb7/0xc0 [ 13.679351] __kmalloc_cache_noprof+0x189/0x420 [ 13.679540] kasan_atomics+0x95/0x310 [ 13.679661] kunit_try_run_case+0x1a5/0x480 [ 13.679795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.680059] kthread+0x337/0x6f0 [ 13.680245] ret_from_fork+0x116/0x1d0 [ 13.680422] ret_from_fork_asm+0x1a/0x30 [ 13.680627] [ 13.680720] The buggy address belongs to the object at ffff8881029e2200 [ 13.680720] which belongs to the cache kmalloc-64 of size 64 [ 13.681175] The buggy address is located 0 bytes to the right of [ 13.681175] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.681533] [ 13.681609] The buggy address belongs to the physical page: [ 13.681964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.682306] flags: 0x200000000000000(node=0|zone=2) [ 13.682494] page_type: f5(slab) [ 13.682645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.682937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.683248] page dumped because: kasan: bad access detected [ 13.683483] [ 13.683590] Memory state around the buggy address: [ 13.683809] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.684089] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.684359] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.684569] ^ [ 13.684724] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.684934] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.685284] ================================================================== [ 14.516741] ================================================================== [ 14.517098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 14.517406] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.517752] [ 14.517851] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.517907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.517920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.517952] Call Trace: [ 14.517968] <TASK> [ 14.517983] dump_stack_lvl+0x73/0xb0 [ 14.518008] print_report+0xd1/0x650 [ 14.518029] ? __virt_addr_valid+0x1db/0x2d0 [ 14.518051] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.518072] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.518098] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.518120] kasan_report+0x141/0x180 [ 14.518141] ? kasan_atomics_helper+0x19e3/0x5450 [ 14.518186] kasan_check_range+0x10c/0x1c0 [ 14.518218] __kasan_check_write+0x18/0x20 [ 14.518240] kasan_atomics_helper+0x19e3/0x5450 [ 14.518263] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.518284] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.518308] ? kasan_atomics+0x152/0x310 [ 14.518333] kasan_atomics+0x1dc/0x310 [ 14.518356] ? __pfx_kasan_atomics+0x10/0x10 [ 14.518379] ? __pfx_read_tsc+0x10/0x10 [ 14.518399] ? ktime_get_ts64+0x86/0x230 [ 14.518424] kunit_try_run_case+0x1a5/0x480 [ 14.518447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.518468] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.518490] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.518513] ? __kthread_parkme+0x82/0x180 [ 14.518533] ? preempt_count_sub+0x50/0x80 [ 14.518556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.518589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.518611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.518634] kthread+0x337/0x6f0 [ 14.518664] ? trace_preempt_on+0x20/0xc0 [ 14.518687] ? __pfx_kthread+0x10/0x10 [ 14.518708] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.518728] ? calculate_sigpending+0x7b/0xa0 [ 14.518752] ? __pfx_kthread+0x10/0x10 [ 14.518773] ret_from_fork+0x116/0x1d0 [ 14.518792] ? __pfx_kthread+0x10/0x10 [ 14.518812] ret_from_fork_asm+0x1a/0x30 [ 14.518842] </TASK> [ 14.518853] [ 14.525701] Allocated by task 291: [ 14.525872] kasan_save_stack+0x45/0x70 [ 14.526088] kasan_save_track+0x18/0x40 [ 14.526314] kasan_save_alloc_info+0x3b/0x50 [ 14.526543] __kasan_kmalloc+0xb7/0xc0 [ 14.526762] __kmalloc_cache_noprof+0x189/0x420 [ 14.526978] kasan_atomics+0x95/0x310 [ 14.527162] kunit_try_run_case+0x1a5/0x480 [ 14.527408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.527679] kthread+0x337/0x6f0 [ 14.527822] ret_from_fork+0x116/0x1d0 [ 14.527997] ret_from_fork_asm+0x1a/0x30 [ 14.528216] [ 14.528281] The buggy address belongs to the object at ffff8881029e2200 [ 14.528281] which belongs to the cache kmalloc-64 of size 64 [ 14.528757] The buggy address is located 0 bytes to the right of [ 14.528757] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.529248] [ 14.529314] The buggy address belongs to the physical page: [ 14.529478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.529711] flags: 0x200000000000000(node=0|zone=2) [ 14.529865] page_type: f5(slab) [ 14.529976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.530363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.530686] page dumped because: kasan: bad access detected [ 14.530923] [ 14.531006] Memory state around the buggy address: [ 14.531250] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.531550] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.531758] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.531963] ^ [ 14.532111] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.532383] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.532691] ================================================================== [ 14.678490] ================================================================== [ 14.678827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 14.679055] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.679338] [ 14.679463] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.679509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.679521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.679543] Call Trace: [ 14.679557] <TASK> [ 14.679571] dump_stack_lvl+0x73/0xb0 [ 14.679597] print_report+0xd1/0x650 [ 14.679619] ? __virt_addr_valid+0x1db/0x2d0 [ 14.679641] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.679662] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.679688] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.679710] kasan_report+0x141/0x180 [ 14.679731] ? kasan_atomics_helper+0x1f43/0x5450 [ 14.679757] kasan_check_range+0x10c/0x1c0 [ 14.679781] __kasan_check_write+0x18/0x20 [ 14.679804] kasan_atomics_helper+0x1f43/0x5450 [ 14.679827] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.679871] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.679896] ? kasan_atomics+0x152/0x310 [ 14.679921] kasan_atomics+0x1dc/0x310 [ 14.679943] ? __pfx_kasan_atomics+0x10/0x10 [ 14.679966] ? __pfx_read_tsc+0x10/0x10 [ 14.679987] ? ktime_get_ts64+0x86/0x230 [ 14.680012] kunit_try_run_case+0x1a5/0x480 [ 14.680035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.680056] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.680078] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.680100] ? __kthread_parkme+0x82/0x180 [ 14.680121] ? preempt_count_sub+0x50/0x80 [ 14.680144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.680187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.680218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.680242] kthread+0x337/0x6f0 [ 14.680261] ? trace_preempt_on+0x20/0xc0 [ 14.680284] ? __pfx_kthread+0x10/0x10 [ 14.680305] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.680324] ? calculate_sigpending+0x7b/0xa0 [ 14.680348] ? __pfx_kthread+0x10/0x10 [ 14.680369] ret_from_fork+0x116/0x1d0 [ 14.680405] ? __pfx_kthread+0x10/0x10 [ 14.680427] ret_from_fork_asm+0x1a/0x30 [ 14.680457] </TASK> [ 14.680467] [ 14.687187] Allocated by task 291: [ 14.687385] kasan_save_stack+0x45/0x70 [ 14.687573] kasan_save_track+0x18/0x40 [ 14.687756] kasan_save_alloc_info+0x3b/0x50 [ 14.687980] __kasan_kmalloc+0xb7/0xc0 [ 14.688151] __kmalloc_cache_noprof+0x189/0x420 [ 14.688379] kasan_atomics+0x95/0x310 [ 14.688511] kunit_try_run_case+0x1a5/0x480 [ 14.688657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.688904] kthread+0x337/0x6f0 [ 14.689077] ret_from_fork+0x116/0x1d0 [ 14.689240] ret_from_fork_asm+0x1a/0x30 [ 14.689370] [ 14.689453] The buggy address belongs to the object at ffff8881029e2200 [ 14.689453] which belongs to the cache kmalloc-64 of size 64 [ 14.689967] The buggy address is located 0 bytes to the right of [ 14.689967] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.690347] [ 14.690410] The buggy address belongs to the physical page: [ 14.690619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.690950] flags: 0x200000000000000(node=0|zone=2) [ 14.691185] page_type: f5(slab) [ 14.691349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.691679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.691996] page dumped because: kasan: bad access detected [ 14.692155] [ 14.692241] Memory state around the buggy address: [ 14.692435] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.692730] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.692932] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.693131] ^ [ 14.693397] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.693729] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.694051] ================================================================== [ 14.610755] ================================================================== [ 14.611414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 14.611761] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.612089] [ 14.612189] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.612244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.612257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.612278] Call Trace: [ 14.612292] <TASK> [ 14.612306] dump_stack_lvl+0x73/0xb0 [ 14.612331] print_report+0xd1/0x650 [ 14.612352] ? __virt_addr_valid+0x1db/0x2d0 [ 14.612374] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.612395] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.612420] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.612442] kasan_report+0x141/0x180 [ 14.612463] ? kasan_atomics_helper+0x1ce1/0x5450 [ 14.612489] kasan_check_range+0x10c/0x1c0 [ 14.612512] __kasan_check_write+0x18/0x20 [ 14.612535] kasan_atomics_helper+0x1ce1/0x5450 [ 14.612556] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.612578] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.612603] ? kasan_atomics+0x152/0x310 [ 14.612627] kasan_atomics+0x1dc/0x310 [ 14.612654] ? __pfx_kasan_atomics+0x10/0x10 [ 14.612677] ? __pfx_read_tsc+0x10/0x10 [ 14.612697] ? ktime_get_ts64+0x86/0x230 [ 14.612722] kunit_try_run_case+0x1a5/0x480 [ 14.612744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.612766] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.612789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.612810] ? __kthread_parkme+0x82/0x180 [ 14.612830] ? preempt_count_sub+0x50/0x80 [ 14.612854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.612877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.612899] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.612922] kthread+0x337/0x6f0 [ 14.612941] ? trace_preempt_on+0x20/0xc0 [ 14.612963] ? __pfx_kthread+0x10/0x10 [ 14.612984] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.613004] ? calculate_sigpending+0x7b/0xa0 [ 14.613027] ? __pfx_kthread+0x10/0x10 [ 14.613049] ret_from_fork+0x116/0x1d0 [ 14.613067] ? __pfx_kthread+0x10/0x10 [ 14.613087] ret_from_fork_asm+0x1a/0x30 [ 14.613118] </TASK> [ 14.613129] [ 14.620427] Allocated by task 291: [ 14.620545] kasan_save_stack+0x45/0x70 [ 14.620685] kasan_save_track+0x18/0x40 [ 14.620813] kasan_save_alloc_info+0x3b/0x50 [ 14.620964] __kasan_kmalloc+0xb7/0xc0 [ 14.621142] __kmalloc_cache_noprof+0x189/0x420 [ 14.621606] kasan_atomics+0x95/0x310 [ 14.621786] kunit_try_run_case+0x1a5/0x480 [ 14.621981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.622233] kthread+0x337/0x6f0 [ 14.622550] ret_from_fork+0x116/0x1d0 [ 14.622709] ret_from_fork_asm+0x1a/0x30 [ 14.622841] [ 14.622903] The buggy address belongs to the object at ffff8881029e2200 [ 14.622903] which belongs to the cache kmalloc-64 of size 64 [ 14.623256] The buggy address is located 0 bytes to the right of [ 14.623256] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.623637] [ 14.623725] The buggy address belongs to the physical page: [ 14.623966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.624334] flags: 0x200000000000000(node=0|zone=2) [ 14.624554] page_type: f5(slab) [ 14.624714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.625039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.625579] page dumped because: kasan: bad access detected [ 14.625748] [ 14.625816] Memory state around the buggy address: [ 14.625968] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.626176] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.626493] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.626803] ^ [ 14.627021] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.627533] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.627830] ================================================================== [ 14.339162] ================================================================== [ 14.339770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 14.340292] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.340512] [ 14.340590] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.340635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.340652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.340674] Call Trace: [ 14.340690] <TASK> [ 14.340705] dump_stack_lvl+0x73/0xb0 [ 14.340730] print_report+0xd1/0x650 [ 14.340751] ? __virt_addr_valid+0x1db/0x2d0 [ 14.340773] ? kasan_atomics_helper+0x1467/0x5450 [ 14.340794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.340819] ? kasan_atomics_helper+0x1467/0x5450 [ 14.340841] kasan_report+0x141/0x180 [ 14.340862] ? kasan_atomics_helper+0x1467/0x5450 [ 14.340888] kasan_check_range+0x10c/0x1c0 [ 14.340911] __kasan_check_write+0x18/0x20 [ 14.340934] kasan_atomics_helper+0x1467/0x5450 [ 14.340956] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.340979] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.341004] ? kasan_atomics+0x152/0x310 [ 14.341029] kasan_atomics+0x1dc/0x310 [ 14.341051] ? __pfx_kasan_atomics+0x10/0x10 [ 14.341075] ? __pfx_read_tsc+0x10/0x10 [ 14.341096] ? ktime_get_ts64+0x86/0x230 [ 14.341120] kunit_try_run_case+0x1a5/0x480 [ 14.341142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.341191] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.341223] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.341245] ? __kthread_parkme+0x82/0x180 [ 14.341266] ? preempt_count_sub+0x50/0x80 [ 14.341299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.341322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.341345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.341379] kthread+0x337/0x6f0 [ 14.341399] ? trace_preempt_on+0x20/0xc0 [ 14.341422] ? __pfx_kthread+0x10/0x10 [ 14.341444] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.341472] ? calculate_sigpending+0x7b/0xa0 [ 14.341496] ? __pfx_kthread+0x10/0x10 [ 14.341517] ret_from_fork+0x116/0x1d0 [ 14.341546] ? __pfx_kthread+0x10/0x10 [ 14.341569] ret_from_fork_asm+0x1a/0x30 [ 14.341602] </TASK> [ 14.341613] [ 14.351760] Allocated by task 291: [ 14.351941] kasan_save_stack+0x45/0x70 [ 14.352154] kasan_save_track+0x18/0x40 [ 14.352341] kasan_save_alloc_info+0x3b/0x50 [ 14.352536] __kasan_kmalloc+0xb7/0xc0 [ 14.352718] __kmalloc_cache_noprof+0x189/0x420 [ 14.352890] kasan_atomics+0x95/0x310 [ 14.353016] kunit_try_run_case+0x1a5/0x480 [ 14.353154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.353428] kthread+0x337/0x6f0 [ 14.353587] ret_from_fork+0x116/0x1d0 [ 14.353762] ret_from_fork_asm+0x1a/0x30 [ 14.353944] [ 14.354106] The buggy address belongs to the object at ffff8881029e2200 [ 14.354106] which belongs to the cache kmalloc-64 of size 64 [ 14.354502] The buggy address is located 0 bytes to the right of [ 14.354502] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.354997] [ 14.355084] The buggy address belongs to the physical page: [ 14.355547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.355855] flags: 0x200000000000000(node=0|zone=2) [ 14.356088] page_type: f5(slab) [ 14.356314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.356621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.356886] page dumped because: kasan: bad access detected [ 14.357144] [ 14.357270] Memory state around the buggy address: [ 14.357467] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.357761] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.358031] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.358253] ^ [ 14.358401] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.358728] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.359034] ================================================================== [ 13.968334] ================================================================== [ 13.969451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 13.969797] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.970248] [ 13.970339] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.970386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.970398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.970420] Call Trace: [ 13.970434] <TASK> [ 13.970448] dump_stack_lvl+0x73/0xb0 [ 13.970474] print_report+0xd1/0x650 [ 13.970495] ? __virt_addr_valid+0x1db/0x2d0 [ 13.970517] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.970538] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.970563] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.970585] kasan_report+0x141/0x180 [ 13.970608] ? kasan_atomics_helper+0x4a84/0x5450 [ 13.970633] __asan_report_load4_noabort+0x18/0x20 [ 13.970657] kasan_atomics_helper+0x4a84/0x5450 [ 13.970679] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.970702] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.970727] ? kasan_atomics+0x152/0x310 [ 13.970752] kasan_atomics+0x1dc/0x310 [ 13.970774] ? __pfx_kasan_atomics+0x10/0x10 [ 13.970798] ? __pfx_read_tsc+0x10/0x10 [ 13.970819] ? ktime_get_ts64+0x86/0x230 [ 13.970844] kunit_try_run_case+0x1a5/0x480 [ 13.970867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.970889] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.970911] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.970933] ? __kthread_parkme+0x82/0x180 [ 13.970952] ? preempt_count_sub+0x50/0x80 [ 13.970976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.970998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.971082] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.971109] kthread+0x337/0x6f0 [ 13.971130] ? trace_preempt_on+0x20/0xc0 [ 13.971153] ? __pfx_kthread+0x10/0x10 [ 13.971175] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.971195] ? calculate_sigpending+0x7b/0xa0 [ 13.971231] ? __pfx_kthread+0x10/0x10 [ 13.971253] ret_from_fork+0x116/0x1d0 [ 13.971273] ? __pfx_kthread+0x10/0x10 [ 13.971294] ret_from_fork_asm+0x1a/0x30 [ 13.971324] </TASK> [ 13.971335] [ 13.978179] Allocated by task 291: [ 13.978352] kasan_save_stack+0x45/0x70 [ 13.978534] kasan_save_track+0x18/0x40 [ 13.978691] kasan_save_alloc_info+0x3b/0x50 [ 13.978857] __kasan_kmalloc+0xb7/0xc0 [ 13.978987] __kmalloc_cache_noprof+0x189/0x420 [ 13.979136] kasan_atomics+0x95/0x310 [ 13.979291] kunit_try_run_case+0x1a5/0x480 [ 13.979490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.979735] kthread+0x337/0x6f0 [ 13.980068] ret_from_fork+0x116/0x1d0 [ 13.980325] ret_from_fork_asm+0x1a/0x30 [ 13.980460] [ 13.980524] The buggy address belongs to the object at ffff8881029e2200 [ 13.980524] which belongs to the cache kmalloc-64 of size 64 [ 13.980873] The buggy address is located 0 bytes to the right of [ 13.980873] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.981390] [ 13.981482] The buggy address belongs to the physical page: [ 13.981722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.982040] flags: 0x200000000000000(node=0|zone=2) [ 13.982196] page_type: f5(slab) [ 13.982423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.982749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.983031] page dumped because: kasan: bad access detected [ 13.983801] [ 13.983903] Memory state around the buggy address: [ 13.984453] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.984792] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.985020] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.985372] ^ [ 13.985586] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.985828] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.986126] ================================================================== [ 14.285907] ================================================================== [ 14.286276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 14.286778] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.287034] [ 14.287110] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.287155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.287167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.287188] Call Trace: [ 14.287202] <TASK> [ 14.287227] dump_stack_lvl+0x73/0xb0 [ 14.287251] print_report+0xd1/0x650 [ 14.287273] ? __virt_addr_valid+0x1db/0x2d0 [ 14.287295] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.287315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.287341] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.287362] kasan_report+0x141/0x180 [ 14.287383] ? kasan_atomics_helper+0x13b5/0x5450 [ 14.287409] kasan_check_range+0x10c/0x1c0 [ 14.287432] __kasan_check_read+0x15/0x20 [ 14.287455] kasan_atomics_helper+0x13b5/0x5450 [ 14.287476] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.287498] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.287522] ? kasan_atomics+0x152/0x310 [ 14.287548] kasan_atomics+0x1dc/0x310 [ 14.287569] ? __pfx_kasan_atomics+0x10/0x10 [ 14.287592] ? __pfx_read_tsc+0x10/0x10 [ 14.287613] ? ktime_get_ts64+0x86/0x230 [ 14.287638] kunit_try_run_case+0x1a5/0x480 [ 14.287660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.287682] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.287705] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.287727] ? __kthread_parkme+0x82/0x180 [ 14.287747] ? preempt_count_sub+0x50/0x80 [ 14.287769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.287793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.287816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.287839] kthread+0x337/0x6f0 [ 14.287859] ? trace_preempt_on+0x20/0xc0 [ 14.287881] ? __pfx_kthread+0x10/0x10 [ 14.287902] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.287922] ? calculate_sigpending+0x7b/0xa0 [ 14.287945] ? __pfx_kthread+0x10/0x10 [ 14.287967] ret_from_fork+0x116/0x1d0 [ 14.287986] ? __pfx_kthread+0x10/0x10 [ 14.288006] ret_from_fork_asm+0x1a/0x30 [ 14.288036] </TASK> [ 14.288046] [ 14.298519] Allocated by task 291: [ 14.298868] kasan_save_stack+0x45/0x70 [ 14.299280] kasan_save_track+0x18/0x40 [ 14.299647] kasan_save_alloc_info+0x3b/0x50 [ 14.300049] __kasan_kmalloc+0xb7/0xc0 [ 14.300436] __kmalloc_cache_noprof+0x189/0x420 [ 14.300869] kasan_atomics+0x95/0x310 [ 14.301254] kunit_try_run_case+0x1a5/0x480 [ 14.301649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.302131] kthread+0x337/0x6f0 [ 14.302474] ret_from_fork+0x116/0x1d0 [ 14.302796] ret_from_fork_asm+0x1a/0x30 [ 14.302928] [ 14.302991] The buggy address belongs to the object at ffff8881029e2200 [ 14.302991] which belongs to the cache kmalloc-64 of size 64 [ 14.303730] The buggy address is located 0 bytes to the right of [ 14.303730] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.304825] [ 14.304976] The buggy address belongs to the physical page: [ 14.305430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.305657] flags: 0x200000000000000(node=0|zone=2) [ 14.305810] page_type: f5(slab) [ 14.305921] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.306138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.306823] page dumped because: kasan: bad access detected [ 14.307322] [ 14.307469] Memory state around the buggy address: [ 14.307898] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.308529] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.309138] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.309756] ^ [ 14.310195] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.310657] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.311120] ================================================================== [ 14.875752] ================================================================== [ 14.876433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 14.877340] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.878041] [ 14.878244] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.878291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.878303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.878324] Call Trace: [ 14.878340] <TASK> [ 14.878355] dump_stack_lvl+0x73/0xb0 [ 14.878381] print_report+0xd1/0x650 [ 14.878402] ? __virt_addr_valid+0x1db/0x2d0 [ 14.878425] ? kasan_atomics_helper+0x5115/0x5450 [ 14.878446] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.878472] ? kasan_atomics_helper+0x5115/0x5450 [ 14.878493] kasan_report+0x141/0x180 [ 14.878515] ? kasan_atomics_helper+0x5115/0x5450 [ 14.878541] __asan_report_load8_noabort+0x18/0x20 [ 14.878565] kasan_atomics_helper+0x5115/0x5450 [ 14.878587] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.878609] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.878634] ? kasan_atomics+0x152/0x310 [ 14.878660] kasan_atomics+0x1dc/0x310 [ 14.878682] ? __pfx_kasan_atomics+0x10/0x10 [ 14.878706] ? __pfx_read_tsc+0x10/0x10 [ 14.878727] ? ktime_get_ts64+0x86/0x230 [ 14.878751] kunit_try_run_case+0x1a5/0x480 [ 14.878777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.878800] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.878823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.878846] ? __kthread_parkme+0x82/0x180 [ 14.878866] ? preempt_count_sub+0x50/0x80 [ 14.878890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.878914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.878936] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.878960] kthread+0x337/0x6f0 [ 14.878979] ? trace_preempt_on+0x20/0xc0 [ 14.879002] ? __pfx_kthread+0x10/0x10 [ 14.879023] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.879043] ? calculate_sigpending+0x7b/0xa0 [ 14.879067] ? __pfx_kthread+0x10/0x10 [ 14.879089] ret_from_fork+0x116/0x1d0 [ 14.879108] ? __pfx_kthread+0x10/0x10 [ 14.879130] ret_from_fork_asm+0x1a/0x30 [ 14.879160] </TASK> [ 14.879190] [ 14.890542] Allocated by task 291: [ 14.890664] kasan_save_stack+0x45/0x70 [ 14.890801] kasan_save_track+0x18/0x40 [ 14.890927] kasan_save_alloc_info+0x3b/0x50 [ 14.891068] __kasan_kmalloc+0xb7/0xc0 [ 14.891276] __kmalloc_cache_noprof+0x189/0x420 [ 14.891660] kasan_atomics+0x95/0x310 [ 14.891971] kunit_try_run_case+0x1a5/0x480 [ 14.892356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.892808] kthread+0x337/0x6f0 [ 14.893099] ret_from_fork+0x116/0x1d0 [ 14.893455] ret_from_fork_asm+0x1a/0x30 [ 14.893804] [ 14.893950] The buggy address belongs to the object at ffff8881029e2200 [ 14.893950] which belongs to the cache kmalloc-64 of size 64 [ 14.894971] The buggy address is located 0 bytes to the right of [ 14.894971] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.895576] [ 14.895644] The buggy address belongs to the physical page: [ 14.895810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.896042] flags: 0x200000000000000(node=0|zone=2) [ 14.896293] page_type: f5(slab) [ 14.896575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.897225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.897849] page dumped because: kasan: bad access detected [ 14.898350] [ 14.898497] Memory state around the buggy address: [ 14.898906] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.899518] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.900088] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.900660] ^ [ 14.900810] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.901482] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.902074] ================================================================== [ 14.268749] ================================================================== [ 14.269332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 14.269609] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.270177] [ 14.270303] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.270350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.270364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.270449] Call Trace: [ 14.270467] <TASK> [ 14.270481] dump_stack_lvl+0x73/0xb0 [ 14.270508] print_report+0xd1/0x650 [ 14.270530] ? __virt_addr_valid+0x1db/0x2d0 [ 14.270553] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.270574] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.270599] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.270621] kasan_report+0x141/0x180 [ 14.270642] ? kasan_atomics_helper+0x49ce/0x5450 [ 14.270668] __asan_report_load4_noabort+0x18/0x20 [ 14.270691] kasan_atomics_helper+0x49ce/0x5450 [ 14.270714] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.270735] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.270759] ? kasan_atomics+0x152/0x310 [ 14.270784] kasan_atomics+0x1dc/0x310 [ 14.270807] ? __pfx_kasan_atomics+0x10/0x10 [ 14.270830] ? __pfx_read_tsc+0x10/0x10 [ 14.270850] ? ktime_get_ts64+0x86/0x230 [ 14.270874] kunit_try_run_case+0x1a5/0x480 [ 14.270897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.270919] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.270941] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.270964] ? __kthread_parkme+0x82/0x180 [ 14.270984] ? preempt_count_sub+0x50/0x80 [ 14.271008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.271032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.271055] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.271077] kthread+0x337/0x6f0 [ 14.271096] ? trace_preempt_on+0x20/0xc0 [ 14.271119] ? __pfx_kthread+0x10/0x10 [ 14.271140] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.271161] ? calculate_sigpending+0x7b/0xa0 [ 14.271184] ? __pfx_kthread+0x10/0x10 [ 14.271216] ret_from_fork+0x116/0x1d0 [ 14.271234] ? __pfx_kthread+0x10/0x10 [ 14.271255] ret_from_fork_asm+0x1a/0x30 [ 14.271285] </TASK> [ 14.271296] [ 14.278174] Allocated by task 291: [ 14.278360] kasan_save_stack+0x45/0x70 [ 14.278497] kasan_save_track+0x18/0x40 [ 14.278625] kasan_save_alloc_info+0x3b/0x50 [ 14.278766] __kasan_kmalloc+0xb7/0xc0 [ 14.278890] __kmalloc_cache_noprof+0x189/0x420 [ 14.279255] kasan_atomics+0x95/0x310 [ 14.279436] kunit_try_run_case+0x1a5/0x480 [ 14.279637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.279880] kthread+0x337/0x6f0 [ 14.280039] ret_from_fork+0x116/0x1d0 [ 14.280197] ret_from_fork_asm+0x1a/0x30 [ 14.280341] [ 14.280405] The buggy address belongs to the object at ffff8881029e2200 [ 14.280405] which belongs to the cache kmalloc-64 of size 64 [ 14.280807] The buggy address is located 0 bytes to the right of [ 14.280807] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.281561] [ 14.281653] The buggy address belongs to the physical page: [ 14.281893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.282126] flags: 0x200000000000000(node=0|zone=2) [ 14.282578] page_type: f5(slab) [ 14.282742] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.283037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.283364] page dumped because: kasan: bad access detected [ 14.283531] [ 14.283596] Memory state around the buggy address: [ 14.283808] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.284116] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.284429] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.284637] ^ [ 14.284787] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.284995] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.285396] ================================================================== [ 14.115283] ================================================================== [ 14.115698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 14.116057] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.116730] [ 14.116958] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.117003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.117017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.117050] Call Trace: [ 14.117066] <TASK> [ 14.117081] dump_stack_lvl+0x73/0xb0 [ 14.117107] print_report+0xd1/0x650 [ 14.117128] ? __virt_addr_valid+0x1db/0x2d0 [ 14.117151] ? kasan_atomics_helper+0x1079/0x5450 [ 14.117171] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.117198] ? kasan_atomics_helper+0x1079/0x5450 [ 14.117238] kasan_report+0x141/0x180 [ 14.117260] ? kasan_atomics_helper+0x1079/0x5450 [ 14.117285] kasan_check_range+0x10c/0x1c0 [ 14.117327] __kasan_check_write+0x18/0x20 [ 14.117350] kasan_atomics_helper+0x1079/0x5450 [ 14.117372] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.117404] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.117428] ? kasan_atomics+0x152/0x310 [ 14.117453] kasan_atomics+0x1dc/0x310 [ 14.117476] ? __pfx_kasan_atomics+0x10/0x10 [ 14.117500] ? __pfx_read_tsc+0x10/0x10 [ 14.117520] ? ktime_get_ts64+0x86/0x230 [ 14.117544] kunit_try_run_case+0x1a5/0x480 [ 14.117567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.117589] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.117612] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.117634] ? __kthread_parkme+0x82/0x180 [ 14.117654] ? preempt_count_sub+0x50/0x80 [ 14.117677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.117701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.117723] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.117746] kthread+0x337/0x6f0 [ 14.117765] ? trace_preempt_on+0x20/0xc0 [ 14.117788] ? __pfx_kthread+0x10/0x10 [ 14.117809] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.117829] ? calculate_sigpending+0x7b/0xa0 [ 14.117853] ? __pfx_kthread+0x10/0x10 [ 14.117875] ret_from_fork+0x116/0x1d0 [ 14.117893] ? __pfx_kthread+0x10/0x10 [ 14.117913] ret_from_fork_asm+0x1a/0x30 [ 14.117944] </TASK> [ 14.117954] [ 14.128170] Allocated by task 291: [ 14.128317] kasan_save_stack+0x45/0x70 [ 14.128493] kasan_save_track+0x18/0x40 [ 14.128622] kasan_save_alloc_info+0x3b/0x50 [ 14.128766] __kasan_kmalloc+0xb7/0xc0 [ 14.128891] __kmalloc_cache_noprof+0x189/0x420 [ 14.129100] kasan_atomics+0x95/0x310 [ 14.129303] kunit_try_run_case+0x1a5/0x480 [ 14.129501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.129740] kthread+0x337/0x6f0 [ 14.129947] ret_from_fork+0x116/0x1d0 [ 14.130124] ret_from_fork_asm+0x1a/0x30 [ 14.130334] [ 14.130420] The buggy address belongs to the object at ffff8881029e2200 [ 14.130420] which belongs to the cache kmalloc-64 of size 64 [ 14.130806] The buggy address is located 0 bytes to the right of [ 14.130806] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.131563] [ 14.131636] The buggy address belongs to the physical page: [ 14.131877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.132218] flags: 0x200000000000000(node=0|zone=2) [ 14.132463] page_type: f5(slab) [ 14.132636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.132950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.133282] page dumped because: kasan: bad access detected [ 14.133589] [ 14.133689] Memory state around the buggy address: [ 14.133891] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.134201] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.134485] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.134693] ^ [ 14.134883] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.135198] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.135471] ================================================================== [ 14.628338] ================================================================== [ 14.628652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 14.628880] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.629104] [ 14.629235] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.629280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.629292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.629314] Call Trace: [ 14.629328] <TASK> [ 14.629343] dump_stack_lvl+0x73/0xb0 [ 14.629367] print_report+0xd1/0x650 [ 14.629389] ? __virt_addr_valid+0x1db/0x2d0 [ 14.629411] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.629432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.629457] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.629479] kasan_report+0x141/0x180 [ 14.629501] ? kasan_atomics_helper+0x1d7a/0x5450 [ 14.629526] kasan_check_range+0x10c/0x1c0 [ 14.629549] __kasan_check_write+0x18/0x20 [ 14.629572] kasan_atomics_helper+0x1d7a/0x5450 [ 14.629594] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.629616] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.629640] ? kasan_atomics+0x152/0x310 [ 14.629665] kasan_atomics+0x1dc/0x310 [ 14.629687] ? __pfx_kasan_atomics+0x10/0x10 [ 14.629711] ? __pfx_read_tsc+0x10/0x10 [ 14.629732] ? ktime_get_ts64+0x86/0x230 [ 14.629756] kunit_try_run_case+0x1a5/0x480 [ 14.629780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.629801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.629823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.629845] ? __kthread_parkme+0x82/0x180 [ 14.629866] ? preempt_count_sub+0x50/0x80 [ 14.629888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.629911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.629934] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.629957] kthread+0x337/0x6f0 [ 14.629976] ? trace_preempt_on+0x20/0xc0 [ 14.629999] ? __pfx_kthread+0x10/0x10 [ 14.630020] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.630040] ? calculate_sigpending+0x7b/0xa0 [ 14.630063] ? __pfx_kthread+0x10/0x10 [ 14.630085] ret_from_fork+0x116/0x1d0 [ 14.630104] ? __pfx_kthread+0x10/0x10 [ 14.630124] ret_from_fork_asm+0x1a/0x30 [ 14.630154] </TASK> [ 14.630164] [ 14.637202] Allocated by task 291: [ 14.637431] kasan_save_stack+0x45/0x70 [ 14.637614] kasan_save_track+0x18/0x40 [ 14.637792] kasan_save_alloc_info+0x3b/0x50 [ 14.637986] __kasan_kmalloc+0xb7/0xc0 [ 14.638136] __kmalloc_cache_noprof+0x189/0x420 [ 14.638297] kasan_atomics+0x95/0x310 [ 14.638419] kunit_try_run_case+0x1a5/0x480 [ 14.638551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.638711] kthread+0x337/0x6f0 [ 14.638857] ret_from_fork+0x116/0x1d0 [ 14.639046] ret_from_fork_asm+0x1a/0x30 [ 14.639246] [ 14.639325] The buggy address belongs to the object at ffff8881029e2200 [ 14.639325] which belongs to the cache kmalloc-64 of size 64 [ 14.639780] The buggy address is located 0 bytes to the right of [ 14.639780] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.640329] [ 14.640395] The buggy address belongs to the physical page: [ 14.640635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.640902] flags: 0x200000000000000(node=0|zone=2) [ 14.641054] page_type: f5(slab) [ 14.641184] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.641531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.641848] page dumped because: kasan: bad access detected [ 14.642087] [ 14.642197] Memory state around the buggy address: [ 14.642397] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.642601] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.642907] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.643272] ^ [ 14.643452] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.643654] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.643852] ================================================================== [ 14.482600] ================================================================== [ 14.483141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 14.483547] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.483901] [ 14.484000] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.484054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.484066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.484088] Call Trace: [ 14.484102] <TASK> [ 14.484126] dump_stack_lvl+0x73/0xb0 [ 14.484153] print_report+0xd1/0x650 [ 14.484193] ? __virt_addr_valid+0x1db/0x2d0 [ 14.484234] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.484255] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.484280] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.484312] kasan_report+0x141/0x180 [ 14.484334] ? kasan_atomics_helper+0x18b1/0x5450 [ 14.484360] kasan_check_range+0x10c/0x1c0 [ 14.484383] __kasan_check_write+0x18/0x20 [ 14.484415] kasan_atomics_helper+0x18b1/0x5450 [ 14.484439] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.484463] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.484498] ? kasan_atomics+0x152/0x310 [ 14.484524] kasan_atomics+0x1dc/0x310 [ 14.484546] ? __pfx_kasan_atomics+0x10/0x10 [ 14.484580] ? __pfx_read_tsc+0x10/0x10 [ 14.484601] ? ktime_get_ts64+0x86/0x230 [ 14.484626] kunit_try_run_case+0x1a5/0x480 [ 14.484663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.484684] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.484707] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.484729] ? __kthread_parkme+0x82/0x180 [ 14.484750] ? preempt_count_sub+0x50/0x80 [ 14.484773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.484796] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.484818] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.484842] kthread+0x337/0x6f0 [ 14.484861] ? trace_preempt_on+0x20/0xc0 [ 14.484884] ? __pfx_kthread+0x10/0x10 [ 14.484905] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.484925] ? calculate_sigpending+0x7b/0xa0 [ 14.484949] ? __pfx_kthread+0x10/0x10 [ 14.484970] ret_from_fork+0x116/0x1d0 [ 14.484988] ? __pfx_kthread+0x10/0x10 [ 14.485009] ret_from_fork_asm+0x1a/0x30 [ 14.485039] </TASK> [ 14.485050] [ 14.492116] Allocated by task 291: [ 14.492311] kasan_save_stack+0x45/0x70 [ 14.492500] kasan_save_track+0x18/0x40 [ 14.492698] kasan_save_alloc_info+0x3b/0x50 [ 14.492880] __kasan_kmalloc+0xb7/0xc0 [ 14.493074] __kmalloc_cache_noprof+0x189/0x420 [ 14.493307] kasan_atomics+0x95/0x310 [ 14.493488] kunit_try_run_case+0x1a5/0x480 [ 14.493646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.493900] kthread+0x337/0x6f0 [ 14.494053] ret_from_fork+0x116/0x1d0 [ 14.494223] ret_from_fork_asm+0x1a/0x30 [ 14.494359] [ 14.494422] The buggy address belongs to the object at ffff8881029e2200 [ 14.494422] which belongs to the cache kmalloc-64 of size 64 [ 14.494763] The buggy address is located 0 bytes to the right of [ 14.494763] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.495227] [ 14.495326] The buggy address belongs to the physical page: [ 14.495612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.496011] flags: 0x200000000000000(node=0|zone=2) [ 14.496294] page_type: f5(slab) [ 14.496452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.496779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.497084] page dumped because: kasan: bad access detected [ 14.497321] [ 14.497420] Memory state around the buggy address: [ 14.497639] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.497955] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.498288] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.498499] ^ [ 14.498647] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.498873] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.499226] ================================================================== [ 14.085965] ================================================================== [ 14.086765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 14.087461] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.087750] [ 14.087923] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.087970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.087983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.088005] Call Trace: [ 14.088022] <TASK> [ 14.088037] dump_stack_lvl+0x73/0xb0 [ 14.088064] print_report+0xd1/0x650 [ 14.088085] ? __virt_addr_valid+0x1db/0x2d0 [ 14.088107] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.088155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.088181] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.088212] kasan_report+0x141/0x180 [ 14.088234] ? kasan_atomics_helper+0x4a36/0x5450 [ 14.088260] __asan_report_load4_noabort+0x18/0x20 [ 14.088284] kasan_atomics_helper+0x4a36/0x5450 [ 14.088306] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.088328] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.088361] ? kasan_atomics+0x152/0x310 [ 14.088388] kasan_atomics+0x1dc/0x310 [ 14.088416] ? __pfx_kasan_atomics+0x10/0x10 [ 14.088440] ? __pfx_read_tsc+0x10/0x10 [ 14.088460] ? ktime_get_ts64+0x86/0x230 [ 14.088486] kunit_try_run_case+0x1a5/0x480 [ 14.088508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.088531] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.088553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.088576] ? __kthread_parkme+0x82/0x180 [ 14.088597] ? preempt_count_sub+0x50/0x80 [ 14.088621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.088644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.088671] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.088695] kthread+0x337/0x6f0 [ 14.088715] ? trace_preempt_on+0x20/0xc0 [ 14.088738] ? __pfx_kthread+0x10/0x10 [ 14.088759] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.088780] ? calculate_sigpending+0x7b/0xa0 [ 14.088803] ? __pfx_kthread+0x10/0x10 [ 14.088825] ret_from_fork+0x116/0x1d0 [ 14.088844] ? __pfx_kthread+0x10/0x10 [ 14.088865] ret_from_fork_asm+0x1a/0x30 [ 14.088895] </TASK> [ 14.088906] [ 14.101771] Allocated by task 291: [ 14.102027] kasan_save_stack+0x45/0x70 [ 14.102318] kasan_save_track+0x18/0x40 [ 14.102450] kasan_save_alloc_info+0x3b/0x50 [ 14.102592] __kasan_kmalloc+0xb7/0xc0 [ 14.102717] __kmalloc_cache_noprof+0x189/0x420 [ 14.102864] kasan_atomics+0x95/0x310 [ 14.102988] kunit_try_run_case+0x1a5/0x480 [ 14.103125] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.103564] kthread+0x337/0x6f0 [ 14.103857] ret_from_fork+0x116/0x1d0 [ 14.104232] ret_from_fork_asm+0x1a/0x30 [ 14.104594] [ 14.104745] The buggy address belongs to the object at ffff8881029e2200 [ 14.104745] which belongs to the cache kmalloc-64 of size 64 [ 14.105862] The buggy address is located 0 bytes to the right of [ 14.105862] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.107253] [ 14.107412] The buggy address belongs to the physical page: [ 14.107934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.108693] flags: 0x200000000000000(node=0|zone=2) [ 14.109127] page_type: f5(slab) [ 14.109461] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.109888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.110109] page dumped because: kasan: bad access detected [ 14.110532] [ 14.110699] Memory state around the buggy address: [ 14.111112] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.111822] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.112599] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.112997] ^ [ 14.113145] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.113730] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.114409] ================================================================== [ 14.410341] ================================================================== [ 14.410705] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 14.411034] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.411301] [ 14.411377] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.411422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.411435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.411456] Call Trace: [ 14.411470] <TASK> [ 14.411485] dump_stack_lvl+0x73/0xb0 [ 14.411509] print_report+0xd1/0x650 [ 14.411531] ? __virt_addr_valid+0x1db/0x2d0 [ 14.411553] ? kasan_atomics_helper+0x164f/0x5450 [ 14.411574] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.411600] ? kasan_atomics_helper+0x164f/0x5450 [ 14.411621] kasan_report+0x141/0x180 [ 14.411643] ? kasan_atomics_helper+0x164f/0x5450 [ 14.411668] kasan_check_range+0x10c/0x1c0 [ 14.411692] __kasan_check_write+0x18/0x20 [ 14.411716] kasan_atomics_helper+0x164f/0x5450 [ 14.411738] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.411760] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.411783] ? kasan_atomics+0x152/0x310 [ 14.411809] kasan_atomics+0x1dc/0x310 [ 14.411831] ? __pfx_kasan_atomics+0x10/0x10 [ 14.411855] ? __pfx_read_tsc+0x10/0x10 [ 14.411876] ? ktime_get_ts64+0x86/0x230 [ 14.411900] kunit_try_run_case+0x1a5/0x480 [ 14.411935] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.411957] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.411979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.412021] ? __kthread_parkme+0x82/0x180 [ 14.412042] ? preempt_count_sub+0x50/0x80 [ 14.412067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.412102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.412125] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.412149] kthread+0x337/0x6f0 [ 14.412186] ? trace_preempt_on+0x20/0xc0 [ 14.412217] ? __pfx_kthread+0x10/0x10 [ 14.412239] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.412259] ? calculate_sigpending+0x7b/0xa0 [ 14.412283] ? __pfx_kthread+0x10/0x10 [ 14.412305] ret_from_fork+0x116/0x1d0 [ 14.412332] ? __pfx_kthread+0x10/0x10 [ 14.412353] ret_from_fork_asm+0x1a/0x30 [ 14.412394] </TASK> [ 14.412405] [ 14.419824] Allocated by task 291: [ 14.419986] kasan_save_stack+0x45/0x70 [ 14.420221] kasan_save_track+0x18/0x40 [ 14.420393] kasan_save_alloc_info+0x3b/0x50 [ 14.420563] __kasan_kmalloc+0xb7/0xc0 [ 14.420693] __kmalloc_cache_noprof+0x189/0x420 [ 14.420841] kasan_atomics+0x95/0x310 [ 14.420966] kunit_try_run_case+0x1a5/0x480 [ 14.421103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.421304] kthread+0x337/0x6f0 [ 14.421420] ret_from_fork+0x116/0x1d0 [ 14.421545] ret_from_fork_asm+0x1a/0x30 [ 14.421754] [ 14.421840] The buggy address belongs to the object at ffff8881029e2200 [ 14.421840] which belongs to the cache kmalloc-64 of size 64 [ 14.422377] The buggy address is located 0 bytes to the right of [ 14.422377] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.422903] [ 14.422988] The buggy address belongs to the physical page: [ 14.423261] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.423604] flags: 0x200000000000000(node=0|zone=2) [ 14.423852] page_type: f5(slab) [ 14.424008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.424371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.424641] page dumped because: kasan: bad access detected [ 14.424809] [ 14.424870] Memory state around the buggy address: [ 14.425016] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.425278] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.425597] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.425915] ^ [ 14.426135] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.426457] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.426770] ================================================================== [ 14.847252] ================================================================== [ 14.847947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 14.848631] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.849309] [ 14.849484] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.849539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.849552] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.849574] Call Trace: [ 14.849601] <TASK> [ 14.849617] dump_stack_lvl+0x73/0xb0 [ 14.849643] print_report+0xd1/0x650 [ 14.849665] ? __virt_addr_valid+0x1db/0x2d0 [ 14.849687] ? kasan_atomics_helper+0x224c/0x5450 [ 14.849708] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.849734] ? kasan_atomics_helper+0x224c/0x5450 [ 14.849756] kasan_report+0x141/0x180 [ 14.849778] ? kasan_atomics_helper+0x224c/0x5450 [ 14.849812] kasan_check_range+0x10c/0x1c0 [ 14.849836] __kasan_check_write+0x18/0x20 [ 14.849859] kasan_atomics_helper+0x224c/0x5450 [ 14.849892] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.849914] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.849938] ? kasan_atomics+0x152/0x310 [ 14.849963] kasan_atomics+0x1dc/0x310 [ 14.849986] ? __pfx_kasan_atomics+0x10/0x10 [ 14.850010] ? __pfx_read_tsc+0x10/0x10 [ 14.850030] ? ktime_get_ts64+0x86/0x230 [ 14.850055] kunit_try_run_case+0x1a5/0x480 [ 14.850078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.850099] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.850121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.850144] ? __kthread_parkme+0x82/0x180 [ 14.850183] ? preempt_count_sub+0x50/0x80 [ 14.850218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.850241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.850264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.850288] kthread+0x337/0x6f0 [ 14.850307] ? trace_preempt_on+0x20/0xc0 [ 14.850331] ? __pfx_kthread+0x10/0x10 [ 14.850351] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.850373] ? calculate_sigpending+0x7b/0xa0 [ 14.850398] ? __pfx_kthread+0x10/0x10 [ 14.850419] ret_from_fork+0x116/0x1d0 [ 14.850438] ? __pfx_kthread+0x10/0x10 [ 14.850459] ret_from_fork_asm+0x1a/0x30 [ 14.850489] </TASK> [ 14.850499] [ 14.863191] Allocated by task 291: [ 14.863531] kasan_save_stack+0x45/0x70 [ 14.863734] kasan_save_track+0x18/0x40 [ 14.864109] kasan_save_alloc_info+0x3b/0x50 [ 14.864312] __kasan_kmalloc+0xb7/0xc0 [ 14.864673] __kmalloc_cache_noprof+0x189/0x420 [ 14.865076] kasan_atomics+0x95/0x310 [ 14.865328] kunit_try_run_case+0x1a5/0x480 [ 14.865722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.865906] kthread+0x337/0x6f0 [ 14.866283] ret_from_fork+0x116/0x1d0 [ 14.866623] ret_from_fork_asm+0x1a/0x30 [ 14.866788] [ 14.866919] The buggy address belongs to the object at ffff8881029e2200 [ 14.866919] which belongs to the cache kmalloc-64 of size 64 [ 14.867612] The buggy address is located 0 bytes to the right of [ 14.867612] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.867972] [ 14.868036] The buggy address belongs to the physical page: [ 14.868318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.868987] flags: 0x200000000000000(node=0|zone=2) [ 14.869458] page_type: f5(slab) [ 14.869745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.870428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.871075] page dumped because: kasan: bad access detected [ 14.871580] [ 14.871730] Memory state around the buggy address: [ 14.872141] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.872526] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.872742] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.872949] ^ [ 14.873099] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.873677] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.874313] ================================================================== [ 14.499749] ================================================================== [ 14.500272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 14.500751] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.500969] [ 14.501044] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.501089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.501101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.501123] Call Trace: [ 14.501135] <TASK> [ 14.501148] dump_stack_lvl+0x73/0xb0 [ 14.501195] print_report+0xd1/0x650 [ 14.501226] ? __virt_addr_valid+0x1db/0x2d0 [ 14.501247] ? kasan_atomics_helper+0x194a/0x5450 [ 14.501268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.501294] ? kasan_atomics_helper+0x194a/0x5450 [ 14.501315] kasan_report+0x141/0x180 [ 14.501340] ? kasan_atomics_helper+0x194a/0x5450 [ 14.501377] kasan_check_range+0x10c/0x1c0 [ 14.501402] __kasan_check_write+0x18/0x20 [ 14.501425] kasan_atomics_helper+0x194a/0x5450 [ 14.501458] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.501480] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.501504] ? kasan_atomics+0x152/0x310 [ 14.501528] kasan_atomics+0x1dc/0x310 [ 14.501551] ? __pfx_kasan_atomics+0x10/0x10 [ 14.501575] ? __pfx_read_tsc+0x10/0x10 [ 14.501596] ? ktime_get_ts64+0x86/0x230 [ 14.501620] kunit_try_run_case+0x1a5/0x480 [ 14.501643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.501666] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.501688] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.501710] ? __kthread_parkme+0x82/0x180 [ 14.501731] ? preempt_count_sub+0x50/0x80 [ 14.501753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.501776] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.501799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.501822] kthread+0x337/0x6f0 [ 14.501842] ? trace_preempt_on+0x20/0xc0 [ 14.501864] ? __pfx_kthread+0x10/0x10 [ 14.501884] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.501905] ? calculate_sigpending+0x7b/0xa0 [ 14.501929] ? __pfx_kthread+0x10/0x10 [ 14.501950] ret_from_fork+0x116/0x1d0 [ 14.501968] ? __pfx_kthread+0x10/0x10 [ 14.501989] ret_from_fork_asm+0x1a/0x30 [ 14.502019] </TASK> [ 14.502030] [ 14.509277] Allocated by task 291: [ 14.509445] kasan_save_stack+0x45/0x70 [ 14.509654] kasan_save_track+0x18/0x40 [ 14.509820] kasan_save_alloc_info+0x3b/0x50 [ 14.510031] __kasan_kmalloc+0xb7/0xc0 [ 14.510162] __kmalloc_cache_noprof+0x189/0x420 [ 14.510338] kasan_atomics+0x95/0x310 [ 14.510465] kunit_try_run_case+0x1a5/0x480 [ 14.510605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.510777] kthread+0x337/0x6f0 [ 14.510893] ret_from_fork+0x116/0x1d0 [ 14.511035] ret_from_fork_asm+0x1a/0x30 [ 14.511278] [ 14.511365] The buggy address belongs to the object at ffff8881029e2200 [ 14.511365] which belongs to the cache kmalloc-64 of size 64 [ 14.511870] The buggy address is located 0 bytes to the right of [ 14.511870] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.512391] [ 14.512456] The buggy address belongs to the physical page: [ 14.512621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.512857] flags: 0x200000000000000(node=0|zone=2) [ 14.513010] page_type: f5(slab) [ 14.513123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.513471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.513813] page dumped because: kasan: bad access detected [ 14.514083] [ 14.514214] Memory state around the buggy address: [ 14.514465] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.514813] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.515155] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.515488] ^ [ 14.515722] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.516012] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.516247] ================================================================== [ 14.003187] ================================================================== [ 14.003530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 14.004124] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.004453] [ 14.004531] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.004578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.004591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.004612] Call Trace: [ 14.004626] <TASK> [ 14.004639] dump_stack_lvl+0x73/0xb0 [ 14.004669] print_report+0xd1/0x650 [ 14.004691] ? __virt_addr_valid+0x1db/0x2d0 [ 14.004713] ? kasan_atomics_helper+0xde0/0x5450 [ 14.004735] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.004761] ? kasan_atomics_helper+0xde0/0x5450 [ 14.004782] kasan_report+0x141/0x180 [ 14.004805] ? kasan_atomics_helper+0xde0/0x5450 [ 14.004830] kasan_check_range+0x10c/0x1c0 [ 14.004853] __kasan_check_write+0x18/0x20 [ 14.004876] kasan_atomics_helper+0xde0/0x5450 [ 14.004898] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.004920] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.004945] ? kasan_atomics+0x152/0x310 [ 14.004970] kasan_atomics+0x1dc/0x310 [ 14.004994] ? __pfx_kasan_atomics+0x10/0x10 [ 14.005018] ? __pfx_read_tsc+0x10/0x10 [ 14.005039] ? ktime_get_ts64+0x86/0x230 [ 14.005063] kunit_try_run_case+0x1a5/0x480 [ 14.005086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.005108] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.005130] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.005153] ? __kthread_parkme+0x82/0x180 [ 14.005173] ? preempt_count_sub+0x50/0x80 [ 14.005196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.005230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.005252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.005275] kthread+0x337/0x6f0 [ 14.005295] ? trace_preempt_on+0x20/0xc0 [ 14.005316] ? __pfx_kthread+0x10/0x10 [ 14.005337] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.005358] ? calculate_sigpending+0x7b/0xa0 [ 14.005381] ? __pfx_kthread+0x10/0x10 [ 14.005402] ret_from_fork+0x116/0x1d0 [ 14.005421] ? __pfx_kthread+0x10/0x10 [ 14.005440] ret_from_fork_asm+0x1a/0x30 [ 14.005471] </TASK> [ 14.005481] [ 14.013280] Allocated by task 291: [ 14.013457] kasan_save_stack+0x45/0x70 [ 14.013628] kasan_save_track+0x18/0x40 [ 14.013787] kasan_save_alloc_info+0x3b/0x50 [ 14.013928] __kasan_kmalloc+0xb7/0xc0 [ 14.014100] __kmalloc_cache_noprof+0x189/0x420 [ 14.014485] kasan_atomics+0x95/0x310 [ 14.014655] kunit_try_run_case+0x1a5/0x480 [ 14.014817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.015048] kthread+0x337/0x6f0 [ 14.015191] ret_from_fork+0x116/0x1d0 [ 14.015335] ret_from_fork_asm+0x1a/0x30 [ 14.015489] [ 14.015577] The buggy address belongs to the object at ffff8881029e2200 [ 14.015577] which belongs to the cache kmalloc-64 of size 64 [ 14.016009] The buggy address is located 0 bytes to the right of [ 14.016009] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.016553] [ 14.016638] The buggy address belongs to the physical page: [ 14.016806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.017038] flags: 0x200000000000000(node=0|zone=2) [ 14.017192] page_type: f5(slab) [ 14.017313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.017537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.017758] page dumped because: kasan: bad access detected [ 14.017922] [ 14.017984] Memory state around the buggy address: [ 14.018196] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.018887] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.019201] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.019509] ^ [ 14.019719] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.019977] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.020188] ================================================================== [ 14.466049] ================================================================== [ 14.466370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 14.466733] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.467025] [ 14.467123] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.467192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.467220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.467240] Call Trace: [ 14.467254] <TASK> [ 14.467268] dump_stack_lvl+0x73/0xb0 [ 14.467294] print_report+0xd1/0x650 [ 14.467315] ? __virt_addr_valid+0x1db/0x2d0 [ 14.467337] ? kasan_atomics_helper+0x1818/0x5450 [ 14.467357] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.467384] ? kasan_atomics_helper+0x1818/0x5450 [ 14.467406] kasan_report+0x141/0x180 [ 14.467428] ? kasan_atomics_helper+0x1818/0x5450 [ 14.467453] kasan_check_range+0x10c/0x1c0 [ 14.467477] __kasan_check_write+0x18/0x20 [ 14.467500] kasan_atomics_helper+0x1818/0x5450 [ 14.467521] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.467543] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.467567] ? kasan_atomics+0x152/0x310 [ 14.467593] kasan_atomics+0x1dc/0x310 [ 14.467616] ? __pfx_kasan_atomics+0x10/0x10 [ 14.467640] ? __pfx_read_tsc+0x10/0x10 [ 14.467660] ? ktime_get_ts64+0x86/0x230 [ 14.467686] kunit_try_run_case+0x1a5/0x480 [ 14.467709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.467731] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.467753] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.467776] ? __kthread_parkme+0x82/0x180 [ 14.467796] ? preempt_count_sub+0x50/0x80 [ 14.467829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.467852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.467875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.467908] kthread+0x337/0x6f0 [ 14.467928] ? trace_preempt_on+0x20/0xc0 [ 14.467950] ? __pfx_kthread+0x10/0x10 [ 14.467970] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.467991] ? calculate_sigpending+0x7b/0xa0 [ 14.468014] ? __pfx_kthread+0x10/0x10 [ 14.468036] ret_from_fork+0x116/0x1d0 [ 14.468054] ? __pfx_kthread+0x10/0x10 [ 14.468075] ret_from_fork_asm+0x1a/0x30 [ 14.468105] </TASK> [ 14.468116] [ 14.475064] Allocated by task 291: [ 14.475249] kasan_save_stack+0x45/0x70 [ 14.475449] kasan_save_track+0x18/0x40 [ 14.475631] kasan_save_alloc_info+0x3b/0x50 [ 14.475829] __kasan_kmalloc+0xb7/0xc0 [ 14.476005] __kmalloc_cache_noprof+0x189/0x420 [ 14.476247] kasan_atomics+0x95/0x310 [ 14.476424] kunit_try_run_case+0x1a5/0x480 [ 14.476601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.476774] kthread+0x337/0x6f0 [ 14.476887] ret_from_fork+0x116/0x1d0 [ 14.477011] ret_from_fork_asm+0x1a/0x30 [ 14.477234] [ 14.477321] The buggy address belongs to the object at ffff8881029e2200 [ 14.477321] which belongs to the cache kmalloc-64 of size 64 [ 14.477886] The buggy address is located 0 bytes to the right of [ 14.477886] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.478387] [ 14.478476] The buggy address belongs to the physical page: [ 14.478742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.479052] flags: 0x200000000000000(node=0|zone=2) [ 14.479278] page_type: f5(slab) [ 14.479417] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.479688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.479994] page dumped because: kasan: bad access detected [ 14.480263] [ 14.480349] Memory state around the buggy address: [ 14.480558] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.480866] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.481183] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.481399] ^ [ 14.481545] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.481753] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.482061] ================================================================== [ 14.054579] ================================================================== [ 14.054893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 14.055242] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.055740] [ 14.055839] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.055883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.055896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.055917] Call Trace: [ 14.055930] <TASK> [ 14.055944] dump_stack_lvl+0x73/0xb0 [ 14.055968] print_report+0xd1/0x650 [ 14.055990] ? __virt_addr_valid+0x1db/0x2d0 [ 14.056011] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.056032] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.056057] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.056079] kasan_report+0x141/0x180 [ 14.056101] ? kasan_atomics_helper+0xfa9/0x5450 [ 14.056125] kasan_check_range+0x10c/0x1c0 [ 14.056148] __kasan_check_write+0x18/0x20 [ 14.056171] kasan_atomics_helper+0xfa9/0x5450 [ 14.056194] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.056226] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.056250] ? kasan_atomics+0x152/0x310 [ 14.056276] kasan_atomics+0x1dc/0x310 [ 14.056300] ? __pfx_kasan_atomics+0x10/0x10 [ 14.056324] ? __pfx_read_tsc+0x10/0x10 [ 14.056346] ? ktime_get_ts64+0x86/0x230 [ 14.056370] kunit_try_run_case+0x1a5/0x480 [ 14.056394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.056417] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.056439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.056462] ? __kthread_parkme+0x82/0x180 [ 14.056482] ? preempt_count_sub+0x50/0x80 [ 14.056504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.056528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.056551] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.056575] kthread+0x337/0x6f0 [ 14.056595] ? trace_preempt_on+0x20/0xc0 [ 14.056618] ? __pfx_kthread+0x10/0x10 [ 14.056639] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.056663] ? calculate_sigpending+0x7b/0xa0 [ 14.056687] ? __pfx_kthread+0x10/0x10 [ 14.056710] ret_from_fork+0x116/0x1d0 [ 14.056729] ? __pfx_kthread+0x10/0x10 [ 14.056749] ret_from_fork_asm+0x1a/0x30 [ 14.056779] </TASK> [ 14.056789] [ 14.071086] Allocated by task 291: [ 14.071553] kasan_save_stack+0x45/0x70 [ 14.072018] kasan_save_track+0x18/0x40 [ 14.072430] kasan_save_alloc_info+0x3b/0x50 [ 14.072580] __kasan_kmalloc+0xb7/0xc0 [ 14.072714] __kmalloc_cache_noprof+0x189/0x420 [ 14.072864] kasan_atomics+0x95/0x310 [ 14.072991] kunit_try_run_case+0x1a5/0x480 [ 14.073130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.073967] kthread+0x337/0x6f0 [ 14.074555] ret_from_fork+0x116/0x1d0 [ 14.075075] ret_from_fork_asm+0x1a/0x30 [ 14.075625] [ 14.075922] The buggy address belongs to the object at ffff8881029e2200 [ 14.075922] which belongs to the cache kmalloc-64 of size 64 [ 14.077389] The buggy address is located 0 bytes to the right of [ 14.077389] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.078510] [ 14.078814] The buggy address belongs to the physical page: [ 14.079410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.080023] flags: 0x200000000000000(node=0|zone=2) [ 14.080357] page_type: f5(slab) [ 14.080752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.081605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.082123] page dumped because: kasan: bad access detected [ 14.082802] [ 14.082967] Memory state around the buggy address: [ 14.083462] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.083683] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.083896] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.084103] ^ [ 14.084265] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.084483] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.085039] ================================================================== [ 14.135822] ================================================================== [ 14.136313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 14.136891] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.137201] [ 14.137290] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.137334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.137346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.137367] Call Trace: [ 14.137381] <TASK> [ 14.137394] dump_stack_lvl+0x73/0xb0 [ 14.137420] print_report+0xd1/0x650 [ 14.137441] ? __virt_addr_valid+0x1db/0x2d0 [ 14.137464] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.137486] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.137512] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.137533] kasan_report+0x141/0x180 [ 14.137556] ? kasan_atomics_helper+0x4a1c/0x5450 [ 14.137581] __asan_report_load4_noabort+0x18/0x20 [ 14.137605] kasan_atomics_helper+0x4a1c/0x5450 [ 14.137627] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.137648] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.137684] ? kasan_atomics+0x152/0x310 [ 14.137709] kasan_atomics+0x1dc/0x310 [ 14.137731] ? __pfx_kasan_atomics+0x10/0x10 [ 14.137766] ? __pfx_read_tsc+0x10/0x10 [ 14.137787] ? ktime_get_ts64+0x86/0x230 [ 14.137811] kunit_try_run_case+0x1a5/0x480 [ 14.137835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.137856] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.137878] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.137901] ? __kthread_parkme+0x82/0x180 [ 14.137921] ? preempt_count_sub+0x50/0x80 [ 14.137944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.137967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.137989] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.138013] kthread+0x337/0x6f0 [ 14.138032] ? trace_preempt_on+0x20/0xc0 [ 14.138055] ? __pfx_kthread+0x10/0x10 [ 14.138076] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.138095] ? calculate_sigpending+0x7b/0xa0 [ 14.138120] ? __pfx_kthread+0x10/0x10 [ 14.138142] ret_from_fork+0x116/0x1d0 [ 14.138161] ? __pfx_kthread+0x10/0x10 [ 14.138181] ret_from_fork_asm+0x1a/0x30 [ 14.138219] </TASK> [ 14.138230] [ 14.145509] Allocated by task 291: [ 14.145627] kasan_save_stack+0x45/0x70 [ 14.145762] kasan_save_track+0x18/0x40 [ 14.145890] kasan_save_alloc_info+0x3b/0x50 [ 14.146089] __kasan_kmalloc+0xb7/0xc0 [ 14.146277] __kmalloc_cache_noprof+0x189/0x420 [ 14.146515] kasan_atomics+0x95/0x310 [ 14.146699] kunit_try_run_case+0x1a5/0x480 [ 14.146895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.147134] kthread+0x337/0x6f0 [ 14.147445] ret_from_fork+0x116/0x1d0 [ 14.147577] ret_from_fork_asm+0x1a/0x30 [ 14.147709] [ 14.147774] The buggy address belongs to the object at ffff8881029e2200 [ 14.147774] which belongs to the cache kmalloc-64 of size 64 [ 14.148116] The buggy address is located 0 bytes to the right of [ 14.148116] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.149159] [ 14.149262] The buggy address belongs to the physical page: [ 14.149530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.149887] flags: 0x200000000000000(node=0|zone=2) [ 14.150105] page_type: f5(slab) [ 14.150340] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.150644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.150888] page dumped because: kasan: bad access detected [ 14.151134] [ 14.151226] Memory state around the buggy address: [ 14.151439] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.151766] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.151973] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.152175] ^ [ 14.152660] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.152975] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.153380] ================================================================== [ 14.821089] ================================================================== [ 14.821654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 14.822096] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.822666] [ 14.822852] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.822909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.822921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.822943] Call Trace: [ 14.822958] <TASK> [ 14.822972] dump_stack_lvl+0x73/0xb0 [ 14.822998] print_report+0xd1/0x650 [ 14.823020] ? __virt_addr_valid+0x1db/0x2d0 [ 14.823051] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.823073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.823100] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.823132] kasan_report+0x141/0x180 [ 14.823154] ? kasan_atomics_helper+0x4fa5/0x5450 [ 14.823198] __asan_report_load8_noabort+0x18/0x20 [ 14.823231] kasan_atomics_helper+0x4fa5/0x5450 [ 14.823253] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.823275] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.823300] ? kasan_atomics+0x152/0x310 [ 14.823326] kasan_atomics+0x1dc/0x310 [ 14.823348] ? __pfx_kasan_atomics+0x10/0x10 [ 14.823372] ? __pfx_read_tsc+0x10/0x10 [ 14.823394] ? ktime_get_ts64+0x86/0x230 [ 14.823418] kunit_try_run_case+0x1a5/0x480 [ 14.823442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.823464] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.823486] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.823510] ? __kthread_parkme+0x82/0x180 [ 14.823530] ? preempt_count_sub+0x50/0x80 [ 14.823554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.823578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.823600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.823624] kthread+0x337/0x6f0 [ 14.823643] ? trace_preempt_on+0x20/0xc0 [ 14.823667] ? __pfx_kthread+0x10/0x10 [ 14.823688] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.823708] ? calculate_sigpending+0x7b/0xa0 [ 14.823734] ? __pfx_kthread+0x10/0x10 [ 14.823758] ret_from_fork+0x116/0x1d0 [ 14.823780] ? __pfx_kthread+0x10/0x10 [ 14.823802] ret_from_fork_asm+0x1a/0x30 [ 14.823832] </TASK> [ 14.823843] [ 14.835360] Allocated by task 291: [ 14.835693] kasan_save_stack+0x45/0x70 [ 14.836050] kasan_save_track+0x18/0x40 [ 14.836425] kasan_save_alloc_info+0x3b/0x50 [ 14.836829] __kasan_kmalloc+0xb7/0xc0 [ 14.837211] __kmalloc_cache_noprof+0x189/0x420 [ 14.837641] kasan_atomics+0x95/0x310 [ 14.837843] kunit_try_run_case+0x1a5/0x480 [ 14.838218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.838596] kthread+0x337/0x6f0 [ 14.838708] ret_from_fork+0x116/0x1d0 [ 14.838829] ret_from_fork_asm+0x1a/0x30 [ 14.838956] [ 14.839017] The buggy address belongs to the object at ffff8881029e2200 [ 14.839017] which belongs to the cache kmalloc-64 of size 64 [ 14.839798] The buggy address is located 0 bytes to the right of [ 14.839798] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.840879] [ 14.841029] The buggy address belongs to the physical page: [ 14.841546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.842237] flags: 0x200000000000000(node=0|zone=2) [ 14.842667] page_type: f5(slab) [ 14.842788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.843290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.843924] page dumped because: kasan: bad access detected [ 14.844104] [ 14.844186] Memory state around the buggy address: [ 14.844611] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.845235] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.845445] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.845645] ^ [ 14.845786] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.845987] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.846255] ================================================================== [ 14.446533] ================================================================== [ 14.446764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 14.446990] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.447327] [ 14.447450] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.447497] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.447509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.447546] Call Trace: [ 14.447562] <TASK> [ 14.447576] dump_stack_lvl+0x73/0xb0 [ 14.447602] print_report+0xd1/0x650 [ 14.447624] ? __virt_addr_valid+0x1db/0x2d0 [ 14.447647] ? kasan_atomics_helper+0x177f/0x5450 [ 14.447668] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.447695] ? kasan_atomics_helper+0x177f/0x5450 [ 14.447717] kasan_report+0x141/0x180 [ 14.447739] ? kasan_atomics_helper+0x177f/0x5450 [ 14.447765] kasan_check_range+0x10c/0x1c0 [ 14.447788] __kasan_check_write+0x18/0x20 [ 14.447811] kasan_atomics_helper+0x177f/0x5450 [ 14.447833] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.447855] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.447880] ? kasan_atomics+0x152/0x310 [ 14.447905] kasan_atomics+0x1dc/0x310 [ 14.447927] ? __pfx_kasan_atomics+0x10/0x10 [ 14.447951] ? __pfx_read_tsc+0x10/0x10 [ 14.447972] ? ktime_get_ts64+0x86/0x230 [ 14.447996] kunit_try_run_case+0x1a5/0x480 [ 14.448020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.448076] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.448099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.448122] ? __kthread_parkme+0x82/0x180 [ 14.448153] ? preempt_count_sub+0x50/0x80 [ 14.448195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.448261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.448284] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.448307] kthread+0x337/0x6f0 [ 14.448326] ? trace_preempt_on+0x20/0xc0 [ 14.448349] ? __pfx_kthread+0x10/0x10 [ 14.448370] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.448391] ? calculate_sigpending+0x7b/0xa0 [ 14.448414] ? __pfx_kthread+0x10/0x10 [ 14.448436] ret_from_fork+0x116/0x1d0 [ 14.448455] ? __pfx_kthread+0x10/0x10 [ 14.448476] ret_from_fork_asm+0x1a/0x30 [ 14.448505] </TASK> [ 14.448516] [ 14.458242] Allocated by task 291: [ 14.458416] kasan_save_stack+0x45/0x70 [ 14.458610] kasan_save_track+0x18/0x40 [ 14.458804] kasan_save_alloc_info+0x3b/0x50 [ 14.459010] __kasan_kmalloc+0xb7/0xc0 [ 14.459242] __kmalloc_cache_noprof+0x189/0x420 [ 14.459454] kasan_atomics+0x95/0x310 [ 14.459629] kunit_try_run_case+0x1a5/0x480 [ 14.459769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.459940] kthread+0x337/0x6f0 [ 14.460057] ret_from_fork+0x116/0x1d0 [ 14.460306] ret_from_fork_asm+0x1a/0x30 [ 14.460498] [ 14.460591] The buggy address belongs to the object at ffff8881029e2200 [ 14.460591] which belongs to the cache kmalloc-64 of size 64 [ 14.461107] The buggy address is located 0 bytes to the right of [ 14.461107] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.461688] [ 14.461758] The buggy address belongs to the physical page: [ 14.461924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.462159] flags: 0x200000000000000(node=0|zone=2) [ 14.462416] page_type: f5(slab) [ 14.462598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.462952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.463336] page dumped because: kasan: bad access detected [ 14.463570] [ 14.463649] Memory state around the buggy address: [ 14.463830] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.464139] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.464433] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.464718] ^ [ 14.464936] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.465260] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.465548] ================================================================== [ 13.870378] ================================================================== [ 13.870828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 13.871179] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.871422] [ 13.871506] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.871551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.871564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.871585] Call Trace: [ 13.871601] <TASK> [ 13.871616] dump_stack_lvl+0x73/0xb0 [ 13.871642] print_report+0xd1/0x650 [ 13.871663] ? __virt_addr_valid+0x1db/0x2d0 [ 13.871685] ? kasan_atomics_helper+0x992/0x5450 [ 13.871706] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.871731] ? kasan_atomics_helper+0x992/0x5450 [ 13.871753] kasan_report+0x141/0x180 [ 13.871774] ? kasan_atomics_helper+0x992/0x5450 [ 13.871800] kasan_check_range+0x10c/0x1c0 [ 13.871824] __kasan_check_write+0x18/0x20 [ 13.871847] kasan_atomics_helper+0x992/0x5450 [ 13.871869] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.871890] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.871914] ? kasan_atomics+0x152/0x310 [ 13.871940] kasan_atomics+0x1dc/0x310 [ 13.871962] ? __pfx_kasan_atomics+0x10/0x10 [ 13.871986] ? __pfx_read_tsc+0x10/0x10 [ 13.872008] ? ktime_get_ts64+0x86/0x230 [ 13.872032] kunit_try_run_case+0x1a5/0x480 [ 13.872056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.872079] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.872101] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.872124] ? __kthread_parkme+0x82/0x180 [ 13.872147] ? preempt_count_sub+0x50/0x80 [ 13.872171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.872195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.872228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.872251] kthread+0x337/0x6f0 [ 13.872271] ? trace_preempt_on+0x20/0xc0 [ 13.872294] ? __pfx_kthread+0x10/0x10 [ 13.872314] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.872335] ? calculate_sigpending+0x7b/0xa0 [ 13.872358] ? __pfx_kthread+0x10/0x10 [ 13.872380] ret_from_fork+0x116/0x1d0 [ 13.872398] ? __pfx_kthread+0x10/0x10 [ 13.872418] ret_from_fork_asm+0x1a/0x30 [ 13.872448] </TASK> [ 13.872459] [ 13.879983] Allocated by task 291: [ 13.880146] kasan_save_stack+0x45/0x70 [ 13.880293] kasan_save_track+0x18/0x40 [ 13.880422] kasan_save_alloc_info+0x3b/0x50 [ 13.880562] __kasan_kmalloc+0xb7/0xc0 [ 13.880750] __kmalloc_cache_noprof+0x189/0x420 [ 13.880987] kasan_atomics+0x95/0x310 [ 13.881170] kunit_try_run_case+0x1a5/0x480 [ 13.881389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.881631] kthread+0x337/0x6f0 [ 13.881774] ret_from_fork+0x116/0x1d0 [ 13.881951] ret_from_fork_asm+0x1a/0x30 [ 13.882125] [ 13.882232] The buggy address belongs to the object at ffff8881029e2200 [ 13.882232] which belongs to the cache kmalloc-64 of size 64 [ 13.882691] The buggy address is located 0 bytes to the right of [ 13.882691] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.883048] [ 13.883112] The buggy address belongs to the physical page: [ 13.883551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.883912] flags: 0x200000000000000(node=0|zone=2) [ 13.884134] page_type: f5(slab) [ 13.884275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.884499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.884722] page dumped because: kasan: bad access detected [ 13.885071] [ 13.885160] Memory state around the buggy address: [ 13.885404] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.885718] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.886025] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.886377] ^ [ 13.886611] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.886866] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.887074] ================================================================== [ 13.835096] ================================================================== [ 13.835545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 13.835964] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.836338] [ 13.836476] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.836524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.836538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.836560] Call Trace: [ 13.836575] <TASK> [ 13.836592] dump_stack_lvl+0x73/0xb0 [ 13.836619] print_report+0xd1/0x650 [ 13.836641] ? __virt_addr_valid+0x1db/0x2d0 [ 13.836669] ? kasan_atomics_helper+0x860/0x5450 [ 13.836690] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.836716] ? kasan_atomics_helper+0x860/0x5450 [ 13.836736] kasan_report+0x141/0x180 [ 13.836758] ? kasan_atomics_helper+0x860/0x5450 [ 13.836783] kasan_check_range+0x10c/0x1c0 [ 13.836806] __kasan_check_write+0x18/0x20 [ 13.836829] kasan_atomics_helper+0x860/0x5450 [ 13.836850] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.836872] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.836897] ? kasan_atomics+0x152/0x310 [ 13.836922] kasan_atomics+0x1dc/0x310 [ 13.836945] ? __pfx_kasan_atomics+0x10/0x10 [ 13.836968] ? __pfx_read_tsc+0x10/0x10 [ 13.836989] ? ktime_get_ts64+0x86/0x230 [ 13.837014] kunit_try_run_case+0x1a5/0x480 [ 13.837037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.837059] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.837081] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.837104] ? __kthread_parkme+0x82/0x180 [ 13.837124] ? preempt_count_sub+0x50/0x80 [ 13.837147] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.837171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.837192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.837247] kthread+0x337/0x6f0 [ 13.837268] ? trace_preempt_on+0x20/0xc0 [ 13.837291] ? __pfx_kthread+0x10/0x10 [ 13.837312] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.837331] ? calculate_sigpending+0x7b/0xa0 [ 13.837355] ? __pfx_kthread+0x10/0x10 [ 13.837377] ret_from_fork+0x116/0x1d0 [ 13.837395] ? __pfx_kthread+0x10/0x10 [ 13.837415] ret_from_fork_asm+0x1a/0x30 [ 13.837447] </TASK> [ 13.837457] [ 13.844869] Allocated by task 291: [ 13.845047] kasan_save_stack+0x45/0x70 [ 13.845248] kasan_save_track+0x18/0x40 [ 13.845494] kasan_save_alloc_info+0x3b/0x50 [ 13.845669] __kasan_kmalloc+0xb7/0xc0 [ 13.845795] __kmalloc_cache_noprof+0x189/0x420 [ 13.845945] kasan_atomics+0x95/0x310 [ 13.846100] kunit_try_run_case+0x1a5/0x480 [ 13.846306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.846553] kthread+0x337/0x6f0 [ 13.846716] ret_from_fork+0x116/0x1d0 [ 13.846964] ret_from_fork_asm+0x1a/0x30 [ 13.847151] [ 13.847225] The buggy address belongs to the object at ffff8881029e2200 [ 13.847225] which belongs to the cache kmalloc-64 of size 64 [ 13.847570] The buggy address is located 0 bytes to the right of [ 13.847570] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.848460] [ 13.848552] The buggy address belongs to the physical page: [ 13.848784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.849019] flags: 0x200000000000000(node=0|zone=2) [ 13.849179] page_type: f5(slab) [ 13.849364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.849718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.850069] page dumped because: kasan: bad access detected [ 13.850368] [ 13.850474] Memory state around the buggy address: [ 13.850669] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.850912] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.851184] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.851400] ^ [ 13.851548] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.851756] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.852253] ================================================================== [ 14.719879] ================================================================== [ 14.720541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 14.721321] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.721942] [ 14.722123] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.722169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.722181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.722213] Call Trace: [ 14.722228] <TASK> [ 14.722242] dump_stack_lvl+0x73/0xb0 [ 14.722277] print_report+0xd1/0x650 [ 14.722300] ? __virt_addr_valid+0x1db/0x2d0 [ 14.722322] ? kasan_atomics_helper+0x2006/0x5450 [ 14.722354] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.722380] ? kasan_atomics_helper+0x2006/0x5450 [ 14.722402] kasan_report+0x141/0x180 [ 14.722423] ? kasan_atomics_helper+0x2006/0x5450 [ 14.722449] kasan_check_range+0x10c/0x1c0 [ 14.722473] __kasan_check_write+0x18/0x20 [ 14.722496] kasan_atomics_helper+0x2006/0x5450 [ 14.722518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.722540] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.722564] ? kasan_atomics+0x152/0x310 [ 14.722590] kasan_atomics+0x1dc/0x310 [ 14.722612] ? __pfx_kasan_atomics+0x10/0x10 [ 14.722636] ? __pfx_read_tsc+0x10/0x10 [ 14.722657] ? ktime_get_ts64+0x86/0x230 [ 14.722681] kunit_try_run_case+0x1a5/0x480 [ 14.722705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.722727] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.722750] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.722771] ? __kthread_parkme+0x82/0x180 [ 14.722791] ? preempt_count_sub+0x50/0x80 [ 14.722814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.722837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.722860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.722883] kthread+0x337/0x6f0 [ 14.722902] ? trace_preempt_on+0x20/0xc0 [ 14.722924] ? __pfx_kthread+0x10/0x10 [ 14.722945] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.722965] ? calculate_sigpending+0x7b/0xa0 [ 14.722988] ? __pfx_kthread+0x10/0x10 [ 14.723010] ret_from_fork+0x116/0x1d0 [ 14.723028] ? __pfx_kthread+0x10/0x10 [ 14.723049] ret_from_fork_asm+0x1a/0x30 [ 14.723078] </TASK> [ 14.723089] [ 14.734448] Allocated by task 291: [ 14.734775] kasan_save_stack+0x45/0x70 [ 14.735148] kasan_save_track+0x18/0x40 [ 14.735520] kasan_save_alloc_info+0x3b/0x50 [ 14.735758] __kasan_kmalloc+0xb7/0xc0 [ 14.735887] __kmalloc_cache_noprof+0x189/0x420 [ 14.736037] kasan_atomics+0x95/0x310 [ 14.736165] kunit_try_run_case+0x1a5/0x480 [ 14.736345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.736566] kthread+0x337/0x6f0 [ 14.736687] ret_from_fork+0x116/0x1d0 [ 14.736826] ret_from_fork_asm+0x1a/0x30 [ 14.737016] [ 14.737104] The buggy address belongs to the object at ffff8881029e2200 [ 14.737104] which belongs to the cache kmalloc-64 of size 64 [ 14.737649] The buggy address is located 0 bytes to the right of [ 14.737649] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.738119] [ 14.738251] The buggy address belongs to the physical page: [ 14.738514] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.738799] flags: 0x200000000000000(node=0|zone=2) [ 14.739055] page_type: f5(slab) [ 14.739249] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.739502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.739818] page dumped because: kasan: bad access detected [ 14.740091] [ 14.740193] Memory state around the buggy address: [ 14.740351] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.740661] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.740956] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.741245] ^ [ 14.741484] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.741741] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.742035] ================================================================== [ 13.644010] ================================================================== [ 13.644383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 13.644723] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.645033] [ 13.645132] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.645197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.645217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.645241] Call Trace: [ 13.645253] <TASK> [ 13.645267] dump_stack_lvl+0x73/0xb0 [ 13.645293] print_report+0xd1/0x650 [ 13.645315] ? __virt_addr_valid+0x1db/0x2d0 [ 13.645337] ? kasan_atomics_helper+0x3df/0x5450 [ 13.645359] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.645384] ? kasan_atomics_helper+0x3df/0x5450 [ 13.645406] kasan_report+0x141/0x180 [ 13.645428] ? kasan_atomics_helper+0x3df/0x5450 [ 13.645453] kasan_check_range+0x10c/0x1c0 [ 13.645478] __kasan_check_read+0x15/0x20 [ 13.645501] kasan_atomics_helper+0x3df/0x5450 [ 13.645523] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.645546] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.645572] ? kasan_atomics+0x152/0x310 [ 13.645599] kasan_atomics+0x1dc/0x310 [ 13.645622] ? __pfx_kasan_atomics+0x10/0x10 [ 13.645646] ? __pfx_read_tsc+0x10/0x10 [ 13.645668] ? ktime_get_ts64+0x86/0x230 [ 13.645693] kunit_try_run_case+0x1a5/0x480 [ 13.645717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.645739] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.645761] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.645785] ? __kthread_parkme+0x82/0x180 [ 13.645806] ? preempt_count_sub+0x50/0x80 [ 13.645830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.645853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.645876] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.645900] kthread+0x337/0x6f0 [ 13.645919] ? trace_preempt_on+0x20/0xc0 [ 13.645943] ? __pfx_kthread+0x10/0x10 [ 13.645964] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.645984] ? calculate_sigpending+0x7b/0xa0 [ 13.646009] ? __pfx_kthread+0x10/0x10 [ 13.646030] ret_from_fork+0x116/0x1d0 [ 13.646048] ? __pfx_kthread+0x10/0x10 [ 13.646069] ret_from_fork_asm+0x1a/0x30 [ 13.646100] </TASK> [ 13.646111] [ 13.652812] Allocated by task 291: [ 13.652935] kasan_save_stack+0x45/0x70 [ 13.653124] kasan_save_track+0x18/0x40 [ 13.653363] kasan_save_alloc_info+0x3b/0x50 [ 13.653590] __kasan_kmalloc+0xb7/0xc0 [ 13.653808] __kmalloc_cache_noprof+0x189/0x420 [ 13.654047] kasan_atomics+0x95/0x310 [ 13.654258] kunit_try_run_case+0x1a5/0x480 [ 13.654457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.654635] kthread+0x337/0x6f0 [ 13.654792] ret_from_fork+0x116/0x1d0 [ 13.654989] ret_from_fork_asm+0x1a/0x30 [ 13.655243] [ 13.655328] The buggy address belongs to the object at ffff8881029e2200 [ 13.655328] which belongs to the cache kmalloc-64 of size 64 [ 13.655746] The buggy address is located 0 bytes to the right of [ 13.655746] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.656289] [ 13.656377] The buggy address belongs to the physical page: [ 13.656634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.656981] flags: 0x200000000000000(node=0|zone=2) [ 13.657230] page_type: f5(slab) [ 13.657361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.657664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.657999] page dumped because: kasan: bad access detected [ 13.658259] [ 13.658322] Memory state around the buggy address: [ 13.658523] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.658778] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.659105] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.659401] ^ [ 13.659618] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.659898] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.660224] ================================================================== [ 14.777381] ================================================================== [ 14.777727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 14.778089] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.778455] [ 14.778574] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.778631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.778644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.778666] Call Trace: [ 14.778682] <TASK> [ 14.778698] dump_stack_lvl+0x73/0xb0 [ 14.778726] print_report+0xd1/0x650 [ 14.778750] ? __virt_addr_valid+0x1db/0x2d0 [ 14.778774] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.778797] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.778823] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.778845] kasan_report+0x141/0x180 [ 14.778869] ? kasan_atomics_helper+0x4fb2/0x5450 [ 14.778895] __asan_report_load8_noabort+0x18/0x20 [ 14.778919] kasan_atomics_helper+0x4fb2/0x5450 [ 14.778942] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.778964] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.778990] ? kasan_atomics+0x152/0x310 [ 14.779016] kasan_atomics+0x1dc/0x310 [ 14.779038] ? __pfx_kasan_atomics+0x10/0x10 [ 14.779062] ? __pfx_read_tsc+0x10/0x10 [ 14.779083] ? ktime_get_ts64+0x86/0x230 [ 14.779107] kunit_try_run_case+0x1a5/0x480 [ 14.779131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.779153] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.779196] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.779227] ? __kthread_parkme+0x82/0x180 [ 14.779256] ? preempt_count_sub+0x50/0x80 [ 14.779280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.779303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.779336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.779359] kthread+0x337/0x6f0 [ 14.779379] ? trace_preempt_on+0x20/0xc0 [ 14.779403] ? __pfx_kthread+0x10/0x10 [ 14.779423] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.779444] ? calculate_sigpending+0x7b/0xa0 [ 14.779468] ? __pfx_kthread+0x10/0x10 [ 14.779490] ret_from_fork+0x116/0x1d0 [ 14.779508] ? __pfx_kthread+0x10/0x10 [ 14.779528] ret_from_fork_asm+0x1a/0x30 [ 14.779558] </TASK> [ 14.779568] [ 14.786621] Allocated by task 291: [ 14.786794] kasan_save_stack+0x45/0x70 [ 14.786978] kasan_save_track+0x18/0x40 [ 14.787147] kasan_save_alloc_info+0x3b/0x50 [ 14.787315] __kasan_kmalloc+0xb7/0xc0 [ 14.787442] __kmalloc_cache_noprof+0x189/0x420 [ 14.787590] kasan_atomics+0x95/0x310 [ 14.787786] kunit_try_run_case+0x1a5/0x480 [ 14.787986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.788253] kthread+0x337/0x6f0 [ 14.788414] ret_from_fork+0x116/0x1d0 [ 14.788565] ret_from_fork_asm+0x1a/0x30 [ 14.788700] [ 14.788764] The buggy address belongs to the object at ffff8881029e2200 [ 14.788764] which belongs to the cache kmalloc-64 of size 64 [ 14.789226] The buggy address is located 0 bytes to the right of [ 14.789226] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.789812] [ 14.789901] The buggy address belongs to the physical page: [ 14.790189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.790528] flags: 0x200000000000000(node=0|zone=2) [ 14.790772] page_type: f5(slab) [ 14.790897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.791122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.791374] page dumped because: kasan: bad access detected [ 14.791566] [ 14.791650] Memory state around the buggy address: [ 14.791862] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.792253] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.792602] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.792814] ^ [ 14.792960] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.793187] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.793504] ================================================================== [ 13.558928] ================================================================== [ 13.559585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 13.560248] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.560603] [ 13.560697] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.560745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.560757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.560779] Call Trace: [ 13.560790] <TASK> [ 13.560806] dump_stack_lvl+0x73/0xb0 [ 13.560834] print_report+0xd1/0x650 [ 13.560856] ? __virt_addr_valid+0x1db/0x2d0 [ 13.560879] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.560899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.560924] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.560944] kasan_report+0x141/0x180 [ 13.560965] ? kasan_atomics_helper+0x4bbc/0x5450 [ 13.560989] __asan_report_load4_noabort+0x18/0x20 [ 13.561012] kasan_atomics_helper+0x4bbc/0x5450 [ 13.561034] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.561054] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.561079] ? kasan_atomics+0x152/0x310 [ 13.561104] kasan_atomics+0x1dc/0x310 [ 13.561125] ? __pfx_kasan_atomics+0x10/0x10 [ 13.561148] ? __pfx_read_tsc+0x10/0x10 [ 13.561170] ? ktime_get_ts64+0x86/0x230 [ 13.561194] kunit_try_run_case+0x1a5/0x480 [ 13.561228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.561249] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.561271] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.561293] ? __kthread_parkme+0x82/0x180 [ 13.561314] ? preempt_count_sub+0x50/0x80 [ 13.561337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.561362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.561384] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.561407] kthread+0x337/0x6f0 [ 13.561426] ? trace_preempt_on+0x20/0xc0 [ 13.561449] ? __pfx_kthread+0x10/0x10 [ 13.561468] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.561488] ? calculate_sigpending+0x7b/0xa0 [ 13.561511] ? __pfx_kthread+0x10/0x10 [ 13.561532] ret_from_fork+0x116/0x1d0 [ 13.561550] ? __pfx_kthread+0x10/0x10 [ 13.561570] ret_from_fork_asm+0x1a/0x30 [ 13.561599] </TASK> [ 13.561609] [ 13.571895] Allocated by task 291: [ 13.572120] kasan_save_stack+0x45/0x70 [ 13.572282] kasan_save_track+0x18/0x40 [ 13.572514] kasan_save_alloc_info+0x3b/0x50 [ 13.572693] __kasan_kmalloc+0xb7/0xc0 [ 13.572853] __kmalloc_cache_noprof+0x189/0x420 [ 13.573041] kasan_atomics+0x95/0x310 [ 13.573610] kunit_try_run_case+0x1a5/0x480 [ 13.573801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.574029] kthread+0x337/0x6f0 [ 13.574404] ret_from_fork+0x116/0x1d0 [ 13.574692] ret_from_fork_asm+0x1a/0x30 [ 13.574834] [ 13.574925] The buggy address belongs to the object at ffff8881029e2200 [ 13.574925] which belongs to the cache kmalloc-64 of size 64 [ 13.575758] The buggy address is located 0 bytes to the right of [ 13.575758] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.576433] [ 13.576583] The buggy address belongs to the physical page: [ 13.576846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.577175] flags: 0x200000000000000(node=0|zone=2) [ 13.577693] page_type: f5(slab) [ 13.577980] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.578316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.578788] page dumped because: kasan: bad access detected [ 13.579134] [ 13.579265] Memory state around the buggy address: [ 13.579616] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.579938] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.580533] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.580899] ^ [ 13.581080] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.581612] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.581864] ================================================================== [ 14.550759] ================================================================== [ 14.551090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 14.551600] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.551927] [ 14.552049] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.552093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.552106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.552128] Call Trace: [ 14.552142] <TASK> [ 14.552156] dump_stack_lvl+0x73/0xb0 [ 14.552215] print_report+0xd1/0x650 [ 14.552236] ? __virt_addr_valid+0x1db/0x2d0 [ 14.552259] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.552280] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.552306] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.552327] kasan_report+0x141/0x180 [ 14.552349] ? kasan_atomics_helper+0x1b22/0x5450 [ 14.552384] kasan_check_range+0x10c/0x1c0 [ 14.552407] __kasan_check_write+0x18/0x20 [ 14.552430] kasan_atomics_helper+0x1b22/0x5450 [ 14.552462] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.552484] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.552508] ? kasan_atomics+0x152/0x310 [ 14.552542] kasan_atomics+0x1dc/0x310 [ 14.552564] ? __pfx_kasan_atomics+0x10/0x10 [ 14.552587] ? __pfx_read_tsc+0x10/0x10 [ 14.552618] ? ktime_get_ts64+0x86/0x230 [ 14.552643] kunit_try_run_case+0x1a5/0x480 [ 14.552670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.552692] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.552723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.552745] ? __kthread_parkme+0x82/0x180 [ 14.552765] ? preempt_count_sub+0x50/0x80 [ 14.552798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.552821] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.552843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.552875] kthread+0x337/0x6f0 [ 14.552896] ? trace_preempt_on+0x20/0xc0 [ 14.552918] ? __pfx_kthread+0x10/0x10 [ 14.552949] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.552970] ? calculate_sigpending+0x7b/0xa0 [ 14.552993] ? __pfx_kthread+0x10/0x10 [ 14.553023] ret_from_fork+0x116/0x1d0 [ 14.553041] ? __pfx_kthread+0x10/0x10 [ 14.553062] ret_from_fork_asm+0x1a/0x30 [ 14.553101] </TASK> [ 14.553112] [ 14.560216] Allocated by task 291: [ 14.560383] kasan_save_stack+0x45/0x70 [ 14.560594] kasan_save_track+0x18/0x40 [ 14.560779] kasan_save_alloc_info+0x3b/0x50 [ 14.560976] __kasan_kmalloc+0xb7/0xc0 [ 14.561151] __kmalloc_cache_noprof+0x189/0x420 [ 14.561383] kasan_atomics+0x95/0x310 [ 14.561560] kunit_try_run_case+0x1a5/0x480 [ 14.561753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.561991] kthread+0x337/0x6f0 [ 14.562148] ret_from_fork+0x116/0x1d0 [ 14.562358] ret_from_fork_asm+0x1a/0x30 [ 14.562548] [ 14.562623] The buggy address belongs to the object at ffff8881029e2200 [ 14.562623] which belongs to the cache kmalloc-64 of size 64 [ 14.562964] The buggy address is located 0 bytes to the right of [ 14.562964] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.563437] [ 14.563524] The buggy address belongs to the physical page: [ 14.563791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.564153] flags: 0x200000000000000(node=0|zone=2) [ 14.564400] page_type: f5(slab) [ 14.564581] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.564938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.565304] page dumped because: kasan: bad access detected [ 14.565526] [ 14.565610] Memory state around the buggy address: [ 14.565819] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.566122] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.566472] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.566766] ^ [ 14.566951] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.567264] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.567565] ================================================================== [ 14.311836] ================================================================== [ 14.312076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 14.312689] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.313330] [ 14.313518] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.313566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.313578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.313601] Call Trace: [ 14.313615] <TASK> [ 14.313630] dump_stack_lvl+0x73/0xb0 [ 14.313656] print_report+0xd1/0x650 [ 14.313677] ? __virt_addr_valid+0x1db/0x2d0 [ 14.313699] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.313720] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.313757] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.313780] kasan_report+0x141/0x180 [ 14.313801] ? kasan_atomics_helper+0x4eae/0x5450 [ 14.313837] __asan_report_load8_noabort+0x18/0x20 [ 14.313861] kasan_atomics_helper+0x4eae/0x5450 [ 14.313883] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.313905] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.313938] ? kasan_atomics+0x152/0x310 [ 14.313963] kasan_atomics+0x1dc/0x310 [ 14.313995] ? __pfx_kasan_atomics+0x10/0x10 [ 14.314020] ? __pfx_read_tsc+0x10/0x10 [ 14.314042] ? ktime_get_ts64+0x86/0x230 [ 14.314068] kunit_try_run_case+0x1a5/0x480 [ 14.314091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.314113] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.314134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.314157] ? __kthread_parkme+0x82/0x180 [ 14.314197] ? preempt_count_sub+0x50/0x80 [ 14.314230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.314254] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.314278] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.314302] kthread+0x337/0x6f0 [ 14.314322] ? trace_preempt_on+0x20/0xc0 [ 14.314345] ? __pfx_kthread+0x10/0x10 [ 14.314366] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.314388] ? calculate_sigpending+0x7b/0xa0 [ 14.314413] ? __pfx_kthread+0x10/0x10 [ 14.314435] ret_from_fork+0x116/0x1d0 [ 14.314454] ? __pfx_kthread+0x10/0x10 [ 14.314474] ret_from_fork_asm+0x1a/0x30 [ 14.314505] </TASK> [ 14.314516] [ 14.326123] Allocated by task 291: [ 14.326464] kasan_save_stack+0x45/0x70 [ 14.326822] kasan_save_track+0x18/0x40 [ 14.327189] kasan_save_alloc_info+0x3b/0x50 [ 14.327581] __kasan_kmalloc+0xb7/0xc0 [ 14.327930] __kmalloc_cache_noprof+0x189/0x420 [ 14.328362] kasan_atomics+0x95/0x310 [ 14.328708] kunit_try_run_case+0x1a5/0x480 [ 14.329090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.329578] kthread+0x337/0x6f0 [ 14.329694] ret_from_fork+0x116/0x1d0 [ 14.329819] ret_from_fork_asm+0x1a/0x30 [ 14.329953] [ 14.330017] The buggy address belongs to the object at ffff8881029e2200 [ 14.330017] which belongs to the cache kmalloc-64 of size 64 [ 14.330825] The buggy address is located 0 bytes to the right of [ 14.330825] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.331920] [ 14.332076] The buggy address belongs to the physical page: [ 14.332582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.333283] flags: 0x200000000000000(node=0|zone=2) [ 14.333524] page_type: f5(slab) [ 14.333851] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.334285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.334856] page dumped because: kasan: bad access detected [ 14.335020] [ 14.335083] Memory state around the buggy address: [ 14.335408] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.336028] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.336653] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.337117] ^ [ 14.337521] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.337990] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.338302] ================================================================== [ 13.887751] ================================================================== [ 13.888083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 13.888482] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.888811] [ 13.888892] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.888939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.888951] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.888973] Call Trace: [ 13.888987] <TASK> [ 13.889001] dump_stack_lvl+0x73/0xb0 [ 13.889027] print_report+0xd1/0x650 [ 13.889049] ? __virt_addr_valid+0x1db/0x2d0 [ 13.889071] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.889092] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.889118] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.889139] kasan_report+0x141/0x180 [ 13.889161] ? kasan_atomics_helper+0xa2b/0x5450 [ 13.889186] kasan_check_range+0x10c/0x1c0 [ 13.889220] __kasan_check_write+0x18/0x20 [ 13.889243] kasan_atomics_helper+0xa2b/0x5450 [ 13.889265] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.889287] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.889311] ? kasan_atomics+0x152/0x310 [ 13.889337] kasan_atomics+0x1dc/0x310 [ 13.889358] ? __pfx_kasan_atomics+0x10/0x10 [ 13.889382] ? __pfx_read_tsc+0x10/0x10 [ 13.889426] ? ktime_get_ts64+0x86/0x230 [ 13.889451] kunit_try_run_case+0x1a5/0x480 [ 13.889474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.889496] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.889519] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.889542] ? __kthread_parkme+0x82/0x180 [ 13.889562] ? preempt_count_sub+0x50/0x80 [ 13.889586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.889609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.889632] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.889655] kthread+0x337/0x6f0 [ 13.889675] ? trace_preempt_on+0x20/0xc0 [ 13.889697] ? __pfx_kthread+0x10/0x10 [ 13.889718] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.889738] ? calculate_sigpending+0x7b/0xa0 [ 13.889762] ? __pfx_kthread+0x10/0x10 [ 13.889783] ret_from_fork+0x116/0x1d0 [ 13.889802] ? __pfx_kthread+0x10/0x10 [ 13.889823] ret_from_fork_asm+0x1a/0x30 [ 13.889853] </TASK> [ 13.889882] [ 13.897152] Allocated by task 291: [ 13.897299] kasan_save_stack+0x45/0x70 [ 13.897448] kasan_save_track+0x18/0x40 [ 13.897578] kasan_save_alloc_info+0x3b/0x50 [ 13.897801] __kasan_kmalloc+0xb7/0xc0 [ 13.897983] __kmalloc_cache_noprof+0x189/0x420 [ 13.898189] kasan_atomics+0x95/0x310 [ 13.898375] kunit_try_run_case+0x1a5/0x480 [ 13.898561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.898730] kthread+0x337/0x6f0 [ 13.898910] ret_from_fork+0x116/0x1d0 [ 13.899089] ret_from_fork_asm+0x1a/0x30 [ 13.899409] [ 13.899481] The buggy address belongs to the object at ffff8881029e2200 [ 13.899481] which belongs to the cache kmalloc-64 of size 64 [ 13.899825] The buggy address is located 0 bytes to the right of [ 13.899825] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.900381] [ 13.900470] The buggy address belongs to the physical page: [ 13.900718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.901054] flags: 0x200000000000000(node=0|zone=2) [ 13.901400] page_type: f5(slab) [ 13.901546] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.901799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.902039] page dumped because: kasan: bad access detected [ 13.902280] [ 13.902383] Memory state around the buggy address: [ 13.902694] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.902959] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.903159] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.903450] ^ [ 13.903660] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.903989] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.904297] ================================================================== [ 13.704302] ================================================================== [ 13.704643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 13.704906] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.705277] [ 13.705386] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.705431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.705444] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.705465] Call Trace: [ 13.705480] <TASK> [ 13.705495] dump_stack_lvl+0x73/0xb0 [ 13.705521] print_report+0xd1/0x650 [ 13.705543] ? __virt_addr_valid+0x1db/0x2d0 [ 13.705564] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.705585] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.705611] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.705633] kasan_report+0x141/0x180 [ 13.705654] ? kasan_atomics_helper+0x4b3a/0x5450 [ 13.705680] __asan_report_store4_noabort+0x1b/0x30 [ 13.705704] kasan_atomics_helper+0x4b3a/0x5450 [ 13.705726] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.705748] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.705772] ? kasan_atomics+0x152/0x310 [ 13.705797] kasan_atomics+0x1dc/0x310 [ 13.705820] ? __pfx_kasan_atomics+0x10/0x10 [ 13.705843] ? __pfx_read_tsc+0x10/0x10 [ 13.705864] ? ktime_get_ts64+0x86/0x230 [ 13.705888] kunit_try_run_case+0x1a5/0x480 [ 13.705913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.705934] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.705956] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.705979] ? __kthread_parkme+0x82/0x180 [ 13.706000] ? preempt_count_sub+0x50/0x80 [ 13.706023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.706046] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.706069] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.706092] kthread+0x337/0x6f0 [ 13.706112] ? trace_preempt_on+0x20/0xc0 [ 13.706135] ? __pfx_kthread+0x10/0x10 [ 13.706156] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.706229] ? calculate_sigpending+0x7b/0xa0 [ 13.706254] ? __pfx_kthread+0x10/0x10 [ 13.706276] ret_from_fork+0x116/0x1d0 [ 13.706295] ? __pfx_kthread+0x10/0x10 [ 13.706316] ret_from_fork_asm+0x1a/0x30 [ 13.706346] </TASK> [ 13.706357] [ 13.713183] Allocated by task 291: [ 13.713363] kasan_save_stack+0x45/0x70 [ 13.713559] kasan_save_track+0x18/0x40 [ 13.713744] kasan_save_alloc_info+0x3b/0x50 [ 13.713936] __kasan_kmalloc+0xb7/0xc0 [ 13.714114] __kmalloc_cache_noprof+0x189/0x420 [ 13.714345] kasan_atomics+0x95/0x310 [ 13.714473] kunit_try_run_case+0x1a5/0x480 [ 13.714673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.714914] kthread+0x337/0x6f0 [ 13.715073] ret_from_fork+0x116/0x1d0 [ 13.715259] ret_from_fork_asm+0x1a/0x30 [ 13.715437] [ 13.715511] The buggy address belongs to the object at ffff8881029e2200 [ 13.715511] which belongs to the cache kmalloc-64 of size 64 [ 13.715898] The buggy address is located 0 bytes to the right of [ 13.715898] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.716290] [ 13.716402] The buggy address belongs to the physical page: [ 13.716646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.717011] flags: 0x200000000000000(node=0|zone=2) [ 13.717272] page_type: f5(slab) [ 13.717449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.717777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.718081] page dumped because: kasan: bad access detected [ 13.718330] [ 13.718396] Memory state around the buggy address: [ 13.718543] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.718753] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.718961] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.719250] ^ [ 13.719486] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.719802] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.720111] ================================================================== [ 13.788253] ================================================================== [ 13.788669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 13.789014] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.789373] [ 13.789455] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.789500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.789512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.789534] Call Trace: [ 13.789547] <TASK> [ 13.789562] dump_stack_lvl+0x73/0xb0 [ 13.789588] print_report+0xd1/0x650 [ 13.789609] ? __virt_addr_valid+0x1db/0x2d0 [ 13.789631] ? kasan_atomics_helper+0x72f/0x5450 [ 13.789652] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.789677] ? kasan_atomics_helper+0x72f/0x5450 [ 13.789699] kasan_report+0x141/0x180 [ 13.789720] ? kasan_atomics_helper+0x72f/0x5450 [ 13.789745] kasan_check_range+0x10c/0x1c0 [ 13.789768] __kasan_check_write+0x18/0x20 [ 13.789791] kasan_atomics_helper+0x72f/0x5450 [ 13.789813] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.789835] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.789860] ? kasan_atomics+0x152/0x310 [ 13.789885] kasan_atomics+0x1dc/0x310 [ 13.789907] ? __pfx_kasan_atomics+0x10/0x10 [ 13.789931] ? __pfx_read_tsc+0x10/0x10 [ 13.789951] ? ktime_get_ts64+0x86/0x230 [ 13.789975] kunit_try_run_case+0x1a5/0x480 [ 13.789999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.790021] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.790042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.790064] ? __kthread_parkme+0x82/0x180 [ 13.790085] ? preempt_count_sub+0x50/0x80 [ 13.790107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.790130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.790152] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.790184] kthread+0x337/0x6f0 [ 13.790211] ? trace_preempt_on+0x20/0xc0 [ 13.790233] ? __pfx_kthread+0x10/0x10 [ 13.790254] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.790276] ? calculate_sigpending+0x7b/0xa0 [ 13.790300] ? __pfx_kthread+0x10/0x10 [ 13.790321] ret_from_fork+0x116/0x1d0 [ 13.790340] ? __pfx_kthread+0x10/0x10 [ 13.790361] ret_from_fork_asm+0x1a/0x30 [ 13.790390] </TASK> [ 13.790401] [ 13.799237] Allocated by task 291: [ 13.799560] kasan_save_stack+0x45/0x70 [ 13.799835] kasan_save_track+0x18/0x40 [ 13.800035] kasan_save_alloc_info+0x3b/0x50 [ 13.800411] __kasan_kmalloc+0xb7/0xc0 [ 13.800671] __kmalloc_cache_noprof+0x189/0x420 [ 13.800977] kasan_atomics+0x95/0x310 [ 13.801277] kunit_try_run_case+0x1a5/0x480 [ 13.801557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.801770] kthread+0x337/0x6f0 [ 13.801917] ret_from_fork+0x116/0x1d0 [ 13.802097] ret_from_fork_asm+0x1a/0x30 [ 13.802535] [ 13.802620] The buggy address belongs to the object at ffff8881029e2200 [ 13.802620] which belongs to the cache kmalloc-64 of size 64 [ 13.803457] The buggy address is located 0 bytes to the right of [ 13.803457] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.804160] [ 13.804251] The buggy address belongs to the physical page: [ 13.804629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.805087] flags: 0x200000000000000(node=0|zone=2) [ 13.805406] page_type: f5(slab) [ 13.805677] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.806077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.806544] page dumped because: kasan: bad access detected [ 13.806887] [ 13.806957] Memory state around the buggy address: [ 13.807343] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.807747] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.808137] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.808628] ^ [ 13.808945] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.809455] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.809763] ================================================================== [ 14.359514] ================================================================== [ 14.359844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 14.360070] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.360612] [ 14.360718] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.360763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.360776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.360797] Call Trace: [ 14.360813] <TASK> [ 14.360828] dump_stack_lvl+0x73/0xb0 [ 14.360853] print_report+0xd1/0x650 [ 14.360874] ? __virt_addr_valid+0x1db/0x2d0 [ 14.360896] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.360918] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.360944] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.360965] kasan_report+0x141/0x180 [ 14.360986] ? kasan_atomics_helper+0x50d4/0x5450 [ 14.361012] __asan_report_store8_noabort+0x1b/0x30 [ 14.361037] kasan_atomics_helper+0x50d4/0x5450 [ 14.361059] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.361081] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.361117] ? kasan_atomics+0x152/0x310 [ 14.361143] kasan_atomics+0x1dc/0x310 [ 14.361166] ? __pfx_kasan_atomics+0x10/0x10 [ 14.361201] ? __pfx_read_tsc+0x10/0x10 [ 14.361231] ? ktime_get_ts64+0x86/0x230 [ 14.361256] kunit_try_run_case+0x1a5/0x480 [ 14.361279] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.361301] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.361323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.361346] ? __kthread_parkme+0x82/0x180 [ 14.361365] ? preempt_count_sub+0x50/0x80 [ 14.361388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.361412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.361434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.361457] kthread+0x337/0x6f0 [ 14.361476] ? trace_preempt_on+0x20/0xc0 [ 14.361499] ? __pfx_kthread+0x10/0x10 [ 14.361519] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.361539] ? calculate_sigpending+0x7b/0xa0 [ 14.361563] ? __pfx_kthread+0x10/0x10 [ 14.361584] ret_from_fork+0x116/0x1d0 [ 14.361603] ? __pfx_kthread+0x10/0x10 [ 14.361624] ret_from_fork_asm+0x1a/0x30 [ 14.361655] </TASK> [ 14.361666] [ 14.369039] Allocated by task 291: [ 14.369306] kasan_save_stack+0x45/0x70 [ 14.369509] kasan_save_track+0x18/0x40 [ 14.369676] kasan_save_alloc_info+0x3b/0x50 [ 14.369892] __kasan_kmalloc+0xb7/0xc0 [ 14.370067] __kmalloc_cache_noprof+0x189/0x420 [ 14.370297] kasan_atomics+0x95/0x310 [ 14.370465] kunit_try_run_case+0x1a5/0x480 [ 14.370667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.370908] kthread+0x337/0x6f0 [ 14.371045] ret_from_fork+0x116/0x1d0 [ 14.371170] ret_from_fork_asm+0x1a/0x30 [ 14.371365] [ 14.371463] The buggy address belongs to the object at ffff8881029e2200 [ 14.371463] which belongs to the cache kmalloc-64 of size 64 [ 14.371943] The buggy address is located 0 bytes to the right of [ 14.371943] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.372507] [ 14.372587] The buggy address belongs to the physical page: [ 14.372815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.373130] flags: 0x200000000000000(node=0|zone=2) [ 14.373421] page_type: f5(slab) [ 14.373534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.373760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.373982] page dumped because: kasan: bad access detected [ 14.374155] [ 14.374251] Memory state around the buggy address: [ 14.374463] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.374836] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.375183] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.375477] ^ [ 14.375627] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.375837] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.376044] ================================================================== [ 13.686017] ================================================================== [ 13.686446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 13.687282] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.687647] [ 13.687728] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.687777] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.687792] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.687814] Call Trace: [ 13.687831] <TASK> [ 13.687847] dump_stack_lvl+0x73/0xb0 [ 13.687874] print_report+0xd1/0x650 [ 13.687922] ? __virt_addr_valid+0x1db/0x2d0 [ 13.687945] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.687966] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.687992] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.688013] kasan_report+0x141/0x180 [ 13.688035] ? kasan_atomics_helper+0x4a0/0x5450 [ 13.688059] kasan_check_range+0x10c/0x1c0 [ 13.688083] __kasan_check_write+0x18/0x20 [ 13.688106] kasan_atomics_helper+0x4a0/0x5450 [ 13.688128] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.688151] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.688176] ? kasan_atomics+0x152/0x310 [ 13.688216] kasan_atomics+0x1dc/0x310 [ 13.688241] ? __pfx_kasan_atomics+0x10/0x10 [ 13.688267] ? __pfx_read_tsc+0x10/0x10 [ 13.688289] ? ktime_get_ts64+0x86/0x230 [ 13.688315] kunit_try_run_case+0x1a5/0x480 [ 13.688339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.688362] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.688403] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.688426] ? __kthread_parkme+0x82/0x180 [ 13.688448] ? preempt_count_sub+0x50/0x80 [ 13.688472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.688495] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.688519] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.688542] kthread+0x337/0x6f0 [ 13.688561] ? trace_preempt_on+0x20/0xc0 [ 13.688585] ? __pfx_kthread+0x10/0x10 [ 13.688606] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.688627] ? calculate_sigpending+0x7b/0xa0 [ 13.688654] ? __pfx_kthread+0x10/0x10 [ 13.688676] ret_from_fork+0x116/0x1d0 [ 13.688694] ? __pfx_kthread+0x10/0x10 [ 13.688715] ret_from_fork_asm+0x1a/0x30 [ 13.688745] </TASK> [ 13.688755] [ 13.696544] Allocated by task 291: [ 13.696715] kasan_save_stack+0x45/0x70 [ 13.696892] kasan_save_track+0x18/0x40 [ 13.697042] kasan_save_alloc_info+0x3b/0x50 [ 13.697180] __kasan_kmalloc+0xb7/0xc0 [ 13.697314] __kmalloc_cache_noprof+0x189/0x420 [ 13.697539] kasan_atomics+0x95/0x310 [ 13.697717] kunit_try_run_case+0x1a5/0x480 [ 13.697911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.698139] kthread+0x337/0x6f0 [ 13.698362] ret_from_fork+0x116/0x1d0 [ 13.698506] ret_from_fork_asm+0x1a/0x30 [ 13.698652] [ 13.698738] The buggy address belongs to the object at ffff8881029e2200 [ 13.698738] which belongs to the cache kmalloc-64 of size 64 [ 13.699266] The buggy address is located 0 bytes to the right of [ 13.699266] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.699749] [ 13.699834] The buggy address belongs to the physical page: [ 13.700065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.700406] flags: 0x200000000000000(node=0|zone=2) [ 13.700600] page_type: f5(slab) [ 13.700775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.701088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.701383] page dumped because: kasan: bad access detected [ 13.701545] [ 13.701606] Memory state around the buggy address: [ 13.701749] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.701949] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.702304] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.702610] ^ [ 13.702821] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.703151] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.703491] ================================================================== [ 14.393720] ================================================================== [ 14.394078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 14.394496] Write of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.394818] [ 14.394935] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.394993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.395006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.395028] Call Trace: [ 14.395040] <TASK> [ 14.395054] dump_stack_lvl+0x73/0xb0 [ 14.395078] print_report+0xd1/0x650 [ 14.395100] ? __virt_addr_valid+0x1db/0x2d0 [ 14.395122] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.395142] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.395188] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.395218] kasan_report+0x141/0x180 [ 14.395240] ? kasan_atomics_helper+0x15b6/0x5450 [ 14.395266] kasan_check_range+0x10c/0x1c0 [ 14.395290] __kasan_check_write+0x18/0x20 [ 14.395313] kasan_atomics_helper+0x15b6/0x5450 [ 14.395335] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.395357] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.395381] ? kasan_atomics+0x152/0x310 [ 14.395407] kasan_atomics+0x1dc/0x310 [ 14.395438] ? __pfx_kasan_atomics+0x10/0x10 [ 14.395463] ? __pfx_read_tsc+0x10/0x10 [ 14.395484] ? ktime_get_ts64+0x86/0x230 [ 14.395520] kunit_try_run_case+0x1a5/0x480 [ 14.395543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395565] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.395588] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.395610] ? __kthread_parkme+0x82/0x180 [ 14.395630] ? preempt_count_sub+0x50/0x80 [ 14.395653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.395677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.395700] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.395723] kthread+0x337/0x6f0 [ 14.395744] ? trace_preempt_on+0x20/0xc0 [ 14.395766] ? __pfx_kthread+0x10/0x10 [ 14.395787] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.395807] ? calculate_sigpending+0x7b/0xa0 [ 14.395831] ? __pfx_kthread+0x10/0x10 [ 14.395852] ret_from_fork+0x116/0x1d0 [ 14.395872] ? __pfx_kthread+0x10/0x10 [ 14.395893] ret_from_fork_asm+0x1a/0x30 [ 14.395923] </TASK> [ 14.395934] [ 14.402833] Allocated by task 291: [ 14.403010] kasan_save_stack+0x45/0x70 [ 14.403223] kasan_save_track+0x18/0x40 [ 14.403402] kasan_save_alloc_info+0x3b/0x50 [ 14.403587] __kasan_kmalloc+0xb7/0xc0 [ 14.403775] __kmalloc_cache_noprof+0x189/0x420 [ 14.403923] kasan_atomics+0x95/0x310 [ 14.404048] kunit_try_run_case+0x1a5/0x480 [ 14.404216] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.404464] kthread+0x337/0x6f0 [ 14.404656] ret_from_fork+0x116/0x1d0 [ 14.404866] ret_from_fork_asm+0x1a/0x30 [ 14.405083] [ 14.405210] The buggy address belongs to the object at ffff8881029e2200 [ 14.405210] which belongs to the cache kmalloc-64 of size 64 [ 14.405567] The buggy address is located 0 bytes to the right of [ 14.405567] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.406085] [ 14.406195] The buggy address belongs to the physical page: [ 14.406461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.406771] flags: 0x200000000000000(node=0|zone=2) [ 14.406987] page_type: f5(slab) [ 14.407144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.407447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.407755] page dumped because: kasan: bad access detected [ 14.407986] [ 14.408049] Memory state around the buggy address: [ 14.408227] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.408436] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.408644] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.408922] ^ [ 14.409148] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.409475] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.409777] ================================================================== [ 14.742617] ================================================================== [ 14.742916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 14.743295] Read of size 8 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.743575] [ 14.743697] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.743743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.743755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.743778] Call Trace: [ 14.743791] <TASK> [ 14.743806] dump_stack_lvl+0x73/0xb0 [ 14.743841] print_report+0xd1/0x650 [ 14.743863] ? __virt_addr_valid+0x1db/0x2d0 [ 14.743885] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.743917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.743943] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.743964] kasan_report+0x141/0x180 [ 14.743994] ? kasan_atomics_helper+0x4f98/0x5450 [ 14.744020] __asan_report_load8_noabort+0x18/0x20 [ 14.744045] kasan_atomics_helper+0x4f98/0x5450 [ 14.744078] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.744099] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.744124] ? kasan_atomics+0x152/0x310 [ 14.744157] kasan_atomics+0x1dc/0x310 [ 14.744198] ? __pfx_kasan_atomics+0x10/0x10 [ 14.744236] ? __pfx_read_tsc+0x10/0x10 [ 14.744257] ? ktime_get_ts64+0x86/0x230 [ 14.744282] kunit_try_run_case+0x1a5/0x480 [ 14.744305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.744327] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.744349] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.744371] ? __kthread_parkme+0x82/0x180 [ 14.744401] ? preempt_count_sub+0x50/0x80 [ 14.744424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.744448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.744481] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.744504] kthread+0x337/0x6f0 [ 14.744523] ? trace_preempt_on+0x20/0xc0 [ 14.744546] ? __pfx_kthread+0x10/0x10 [ 14.744566] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.744587] ? calculate_sigpending+0x7b/0xa0 [ 14.744611] ? __pfx_kthread+0x10/0x10 [ 14.744632] ret_from_fork+0x116/0x1d0 [ 14.744654] ? __pfx_kthread+0x10/0x10 [ 14.744675] ret_from_fork_asm+0x1a/0x30 [ 14.744705] </TASK> [ 14.744716] [ 14.751818] Allocated by task 291: [ 14.751958] kasan_save_stack+0x45/0x70 [ 14.752092] kasan_save_track+0x18/0x40 [ 14.752234] kasan_save_alloc_info+0x3b/0x50 [ 14.752380] __kasan_kmalloc+0xb7/0xc0 [ 14.752557] __kmalloc_cache_noprof+0x189/0x420 [ 14.752770] kasan_atomics+0x95/0x310 [ 14.752996] kunit_try_run_case+0x1a5/0x480 [ 14.753253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.753505] kthread+0x337/0x6f0 [ 14.753664] ret_from_fork+0x116/0x1d0 [ 14.753838] ret_from_fork_asm+0x1a/0x30 [ 14.754026] [ 14.754128] The buggy address belongs to the object at ffff8881029e2200 [ 14.754128] which belongs to the cache kmalloc-64 of size 64 [ 14.754622] The buggy address is located 0 bytes to the right of [ 14.754622] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.755144] [ 14.755263] The buggy address belongs to the physical page: [ 14.755481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.755805] flags: 0x200000000000000(node=0|zone=2) [ 14.756026] page_type: f5(slab) [ 14.756216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.756546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.756859] page dumped because: kasan: bad access detected [ 14.757025] [ 14.757088] Memory state around the buggy address: [ 14.757302] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.757620] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.757928] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.758264] ^ [ 14.758472] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.758681] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.758944] ================================================================== [ 13.986682] ================================================================== [ 13.986944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 13.987279] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.987639] [ 13.987746] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.987792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.987805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.987828] Call Trace: [ 13.987842] <TASK> [ 13.987858] dump_stack_lvl+0x73/0xb0 [ 13.987884] print_report+0xd1/0x650 [ 13.987905] ? __virt_addr_valid+0x1db/0x2d0 [ 13.987928] ? kasan_atomics_helper+0xd47/0x5450 [ 13.987949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.987975] ? kasan_atomics_helper+0xd47/0x5450 [ 13.987996] kasan_report+0x141/0x180 [ 13.988017] ? kasan_atomics_helper+0xd47/0x5450 [ 13.988043] kasan_check_range+0x10c/0x1c0 [ 13.988067] __kasan_check_write+0x18/0x20 [ 13.988090] kasan_atomics_helper+0xd47/0x5450 [ 13.988112] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.988134] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.988158] ? kasan_atomics+0x152/0x310 [ 13.988184] kasan_atomics+0x1dc/0x310 [ 13.988218] ? __pfx_kasan_atomics+0x10/0x10 [ 13.988242] ? __pfx_read_tsc+0x10/0x10 [ 13.988263] ? ktime_get_ts64+0x86/0x230 [ 13.988287] kunit_try_run_case+0x1a5/0x480 [ 13.988310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.988332] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.988355] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.988377] ? __kthread_parkme+0x82/0x180 [ 13.988397] ? preempt_count_sub+0x50/0x80 [ 13.988420] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.988443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.988465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.988489] kthread+0x337/0x6f0 [ 13.988508] ? trace_preempt_on+0x20/0xc0 [ 13.988531] ? __pfx_kthread+0x10/0x10 [ 13.988551] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.988572] ? calculate_sigpending+0x7b/0xa0 [ 13.988596] ? __pfx_kthread+0x10/0x10 [ 13.988617] ret_from_fork+0x116/0x1d0 [ 13.988635] ? __pfx_kthread+0x10/0x10 [ 13.988659] ret_from_fork_asm+0x1a/0x30 [ 13.988689] </TASK> [ 13.988699] [ 13.995993] Allocated by task 291: [ 13.996163] kasan_save_stack+0x45/0x70 [ 13.996396] kasan_save_track+0x18/0x40 [ 13.996557] kasan_save_alloc_info+0x3b/0x50 [ 13.996729] __kasan_kmalloc+0xb7/0xc0 [ 13.996909] __kmalloc_cache_noprof+0x189/0x420 [ 13.997101] kasan_atomics+0x95/0x310 [ 13.997255] kunit_try_run_case+0x1a5/0x480 [ 13.997396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.997563] kthread+0x337/0x6f0 [ 13.997785] ret_from_fork+0x116/0x1d0 [ 13.997959] ret_from_fork_asm+0x1a/0x30 [ 13.998201] [ 13.998290] The buggy address belongs to the object at ffff8881029e2200 [ 13.998290] which belongs to the cache kmalloc-64 of size 64 [ 13.998649] The buggy address is located 0 bytes to the right of [ 13.998649] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.999167] [ 13.999263] The buggy address belongs to the physical page: [ 13.999512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.999819] flags: 0x200000000000000(node=0|zone=2) [ 14.000007] page_type: f5(slab) [ 14.000153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.000464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.000750] page dumped because: kasan: bad access detected [ 14.000972] [ 14.001044] Memory state around the buggy address: [ 14.001278] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.001552] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.001834] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.002048] ^ [ 14.002194] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.002411] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.002619] ================================================================== [ 13.852864] ================================================================== [ 13.853218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 13.853993] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.854239] [ 13.854320] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.854366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.854380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.854402] Call Trace: [ 13.854420] <TASK> [ 13.854436] dump_stack_lvl+0x73/0xb0 [ 13.854465] print_report+0xd1/0x650 [ 13.854486] ? __virt_addr_valid+0x1db/0x2d0 [ 13.854509] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.854530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.854556] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.854577] kasan_report+0x141/0x180 [ 13.854600] ? kasan_atomics_helper+0x8f9/0x5450 [ 13.854625] kasan_check_range+0x10c/0x1c0 [ 13.854650] __kasan_check_write+0x18/0x20 [ 13.854674] kasan_atomics_helper+0x8f9/0x5450 [ 13.854696] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.854718] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.854742] ? kasan_atomics+0x152/0x310 [ 13.854768] kasan_atomics+0x1dc/0x310 [ 13.854790] ? __pfx_kasan_atomics+0x10/0x10 [ 13.854813] ? __pfx_read_tsc+0x10/0x10 [ 13.854834] ? ktime_get_ts64+0x86/0x230 [ 13.854859] kunit_try_run_case+0x1a5/0x480 [ 13.854910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.854933] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.854955] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.854978] ? __kthread_parkme+0x82/0x180 [ 13.854999] ? preempt_count_sub+0x50/0x80 [ 13.855022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.855045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.855068] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.855090] kthread+0x337/0x6f0 [ 13.855109] ? trace_preempt_on+0x20/0xc0 [ 13.855133] ? __pfx_kthread+0x10/0x10 [ 13.855153] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.855173] ? calculate_sigpending+0x7b/0xa0 [ 13.855197] ? __pfx_kthread+0x10/0x10 [ 13.855227] ret_from_fork+0x116/0x1d0 [ 13.855246] ? __pfx_kthread+0x10/0x10 [ 13.855266] ret_from_fork_asm+0x1a/0x30 [ 13.855297] </TASK> [ 13.855308] [ 13.862568] Allocated by task 291: [ 13.862691] kasan_save_stack+0x45/0x70 [ 13.862829] kasan_save_track+0x18/0x40 [ 13.863030] kasan_save_alloc_info+0x3b/0x50 [ 13.863307] __kasan_kmalloc+0xb7/0xc0 [ 13.863484] __kmalloc_cache_noprof+0x189/0x420 [ 13.863697] kasan_atomics+0x95/0x310 [ 13.863872] kunit_try_run_case+0x1a5/0x480 [ 13.864030] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.864299] kthread+0x337/0x6f0 [ 13.864483] ret_from_fork+0x116/0x1d0 [ 13.864682] ret_from_fork_asm+0x1a/0x30 [ 13.864819] [ 13.864898] The buggy address belongs to the object at ffff8881029e2200 [ 13.864898] which belongs to the cache kmalloc-64 of size 64 [ 13.865482] The buggy address is located 0 bytes to the right of [ 13.865482] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.865893] [ 13.865957] The buggy address belongs to the physical page: [ 13.866123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.866496] flags: 0x200000000000000(node=0|zone=2) [ 13.866720] page_type: f5(slab) [ 13.866918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.867157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.867390] page dumped because: kasan: bad access detected [ 13.867651] [ 13.867738] Memory state around the buggy address: [ 13.867974] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.868311] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.868790] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.868999] ^ [ 13.869151] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.869484] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.869790] ================================================================== [ 14.171061] ================================================================== [ 14.171659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 14.171903] Read of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.172117] [ 14.172192] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.172397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.172413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.172513] Call Trace: [ 14.172528] <TASK> [ 14.172543] dump_stack_lvl+0x73/0xb0 [ 14.172658] print_report+0xd1/0x650 [ 14.172683] ? __virt_addr_valid+0x1db/0x2d0 [ 14.172704] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.172803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.172829] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.172862] kasan_report+0x141/0x180 [ 14.172885] ? kasan_atomics_helper+0x4a02/0x5450 [ 14.172910] __asan_report_load4_noabort+0x18/0x20 [ 14.173100] kasan_atomics_helper+0x4a02/0x5450 [ 14.173124] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.173159] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.173183] ? kasan_atomics+0x152/0x310 [ 14.173218] kasan_atomics+0x1dc/0x310 [ 14.173241] ? __pfx_kasan_atomics+0x10/0x10 [ 14.173264] ? __pfx_read_tsc+0x10/0x10 [ 14.173285] ? ktime_get_ts64+0x86/0x230 [ 14.173310] kunit_try_run_case+0x1a5/0x480 [ 14.173334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.173355] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.173377] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.173400] ? __kthread_parkme+0x82/0x180 [ 14.173420] ? preempt_count_sub+0x50/0x80 [ 14.173444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.173467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.173489] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.173512] kthread+0x337/0x6f0 [ 14.173532] ? trace_preempt_on+0x20/0xc0 [ 14.173555] ? __pfx_kthread+0x10/0x10 [ 14.173575] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.173596] ? calculate_sigpending+0x7b/0xa0 [ 14.173618] ? __pfx_kthread+0x10/0x10 [ 14.173640] ret_from_fork+0x116/0x1d0 [ 14.173659] ? __pfx_kthread+0x10/0x10 [ 14.173680] ret_from_fork_asm+0x1a/0x30 [ 14.173710] </TASK> [ 14.173722] [ 14.181256] Allocated by task 291: [ 14.181446] kasan_save_stack+0x45/0x70 [ 14.181652] kasan_save_track+0x18/0x40 [ 14.181826] kasan_save_alloc_info+0x3b/0x50 [ 14.182011] __kasan_kmalloc+0xb7/0xc0 [ 14.182272] __kmalloc_cache_noprof+0x189/0x420 [ 14.182593] kasan_atomics+0x95/0x310 [ 14.182862] kunit_try_run_case+0x1a5/0x480 [ 14.183138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.183316] kthread+0x337/0x6f0 [ 14.183432] ret_from_fork+0x116/0x1d0 [ 14.183557] ret_from_fork_asm+0x1a/0x30 [ 14.183689] [ 14.183845] The buggy address belongs to the object at ffff8881029e2200 [ 14.183845] which belongs to the cache kmalloc-64 of size 64 [ 14.184819] The buggy address is located 0 bytes to the right of [ 14.184819] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.188228] [ 14.188543] The buggy address belongs to the physical page: [ 14.189500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.190253] flags: 0x200000000000000(node=0|zone=2) [ 14.190432] page_type: f5(slab) [ 14.190553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.190783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.191004] page dumped because: kasan: bad access detected [ 14.191170] [ 14.192063] Memory state around the buggy address: [ 14.192984] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.193897] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.194828] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.195683] ^ [ 14.196363] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.196968] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.197433] ================================================================== [ 14.037182] ================================================================== [ 14.037932] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 14.038267] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 14.038583] [ 14.038700] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 14.038746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.038759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.038780] Call Trace: [ 14.038795] <TASK> [ 14.038809] dump_stack_lvl+0x73/0xb0 [ 14.038834] print_report+0xd1/0x650 [ 14.038855] ? __virt_addr_valid+0x1db/0x2d0 [ 14.038877] ? kasan_atomics_helper+0xf10/0x5450 [ 14.038899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.038924] ? kasan_atomics_helper+0xf10/0x5450 [ 14.038946] kasan_report+0x141/0x180 [ 14.038967] ? kasan_atomics_helper+0xf10/0x5450 [ 14.038993] kasan_check_range+0x10c/0x1c0 [ 14.039016] __kasan_check_write+0x18/0x20 [ 14.039039] kasan_atomics_helper+0xf10/0x5450 [ 14.039061] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.039083] ? __kmalloc_cache_noprof+0x189/0x420 [ 14.039107] ? kasan_atomics+0x152/0x310 [ 14.039132] kasan_atomics+0x1dc/0x310 [ 14.039155] ? __pfx_kasan_atomics+0x10/0x10 [ 14.039178] ? __pfx_read_tsc+0x10/0x10 [ 14.039199] ? ktime_get_ts64+0x86/0x230 [ 14.039233] kunit_try_run_case+0x1a5/0x480 [ 14.039256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.039278] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 14.039300] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.039323] ? __kthread_parkme+0x82/0x180 [ 14.039343] ? preempt_count_sub+0x50/0x80 [ 14.039366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.039389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.039411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.039434] kthread+0x337/0x6f0 [ 14.039453] ? trace_preempt_on+0x20/0xc0 [ 14.039475] ? __pfx_kthread+0x10/0x10 [ 14.039496] ? _raw_spin_unlock_irq+0x47/0x80 [ 14.039516] ? calculate_sigpending+0x7b/0xa0 [ 14.039540] ? __pfx_kthread+0x10/0x10 [ 14.039561] ret_from_fork+0x116/0x1d0 [ 14.039579] ? __pfx_kthread+0x10/0x10 [ 14.039600] ret_from_fork_asm+0x1a/0x30 [ 14.039629] </TASK> [ 14.039639] [ 14.046763] Allocated by task 291: [ 14.046930] kasan_save_stack+0x45/0x70 [ 14.047117] kasan_save_track+0x18/0x40 [ 14.047408] kasan_save_alloc_info+0x3b/0x50 [ 14.047551] __kasan_kmalloc+0xb7/0xc0 [ 14.047675] __kmalloc_cache_noprof+0x189/0x420 [ 14.047822] kasan_atomics+0x95/0x310 [ 14.047947] kunit_try_run_case+0x1a5/0x480 [ 14.048085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.048303] kthread+0x337/0x6f0 [ 14.048466] ret_from_fork+0x116/0x1d0 [ 14.048715] ret_from_fork_asm+0x1a/0x30 [ 14.048907] [ 14.048995] The buggy address belongs to the object at ffff8881029e2200 [ 14.048995] which belongs to the cache kmalloc-64 of size 64 [ 14.049783] The buggy address is located 0 bytes to the right of [ 14.049783] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 14.050292] [ 14.050367] The buggy address belongs to the physical page: [ 14.050572] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 14.050891] flags: 0x200000000000000(node=0|zone=2) [ 14.051103] page_type: f5(slab) [ 14.051285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.051517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 14.051737] page dumped because: kasan: bad access detected [ 14.051899] [ 14.051960] Memory state around the buggy address: [ 14.052107] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.052447] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 14.052761] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.053155] ^ [ 14.053582] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.053875] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.054082] ================================================================== [ 13.583358] ================================================================== [ 13.583721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 13.583993] Write of size 4 at addr ffff8881029e2230 by task kunit_try_catch/291 [ 13.584417] [ 13.584595] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT(voluntary) [ 13.584644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 13.584659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 13.584680] Call Trace: [ 13.584694] <TASK> [ 13.584709] dump_stack_lvl+0x73/0xb0 [ 13.584734] print_report+0xd1/0x650 [ 13.584755] ? __virt_addr_valid+0x1db/0x2d0 [ 13.584776] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.584796] ? kasan_complete_mode_report_info+0x2a/0x200 [ 13.584821] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.584842] kasan_report+0x141/0x180 [ 13.584863] ? kasan_atomics_helper+0x4ba2/0x5450 [ 13.584887] __asan_report_store4_noabort+0x1b/0x30 [ 13.584911] kasan_atomics_helper+0x4ba2/0x5450 [ 13.584932] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 13.584953] ? __kmalloc_cache_noprof+0x189/0x420 [ 13.584976] ? kasan_atomics+0x152/0x310 [ 13.585000] kasan_atomics+0x1dc/0x310 [ 13.585021] ? __pfx_kasan_atomics+0x10/0x10 [ 13.585044] ? __pfx_read_tsc+0x10/0x10 [ 13.585064] ? ktime_get_ts64+0x86/0x230 [ 13.585088] kunit_try_run_case+0x1a5/0x480 [ 13.585111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.585132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 13.585153] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 13.585175] ? __kthread_parkme+0x82/0x180 [ 13.585195] ? preempt_count_sub+0x50/0x80 [ 13.585229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 13.585252] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.585274] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 13.585296] kthread+0x337/0x6f0 [ 13.585315] ? trace_preempt_on+0x20/0xc0 [ 13.585337] ? __pfx_kthread+0x10/0x10 [ 13.585357] ? _raw_spin_unlock_irq+0x47/0x80 [ 13.585377] ? calculate_sigpending+0x7b/0xa0 [ 13.585399] ? __pfx_kthread+0x10/0x10 [ 13.585420] ret_from_fork+0x116/0x1d0 [ 13.585485] ? __pfx_kthread+0x10/0x10 [ 13.585506] ret_from_fork_asm+0x1a/0x30 [ 13.585536] </TASK> [ 13.585546] [ 13.595537] Allocated by task 291: [ 13.596075] kasan_save_stack+0x45/0x70 [ 13.596237] kasan_save_track+0x18/0x40 [ 13.596513] kasan_save_alloc_info+0x3b/0x50 [ 13.596931] __kasan_kmalloc+0xb7/0xc0 [ 13.597103] __kmalloc_cache_noprof+0x189/0x420 [ 13.597521] kasan_atomics+0x95/0x310 [ 13.597676] kunit_try_run_case+0x1a5/0x480 [ 13.597866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 13.598266] kthread+0x337/0x6f0 [ 13.598431] ret_from_fork+0x116/0x1d0 [ 13.598848] ret_from_fork_asm+0x1a/0x30 [ 13.598994] [ 13.599082] The buggy address belongs to the object at ffff8881029e2200 [ 13.599082] which belongs to the cache kmalloc-64 of size 64 [ 13.600017] The buggy address is located 0 bytes to the right of [ 13.600017] allocated 48-byte region [ffff8881029e2200, ffff8881029e2230) [ 13.600770] [ 13.600868] The buggy address belongs to the physical page: [ 13.601251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e2 [ 13.601590] flags: 0x200000000000000(node=0|zone=2) [ 13.601746] page_type: f5(slab) [ 13.602106] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 13.602676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 13.602993] page dumped because: kasan: bad access detected [ 13.603319] [ 13.603403] Memory state around the buggy address: [ 13.603641] ffff8881029e2100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.604371] ffff8881029e2180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 13.604762] >ffff8881029e2200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 13.605074] ^ [ 13.605622] ffff8881029e2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.605966] ffff8881029e2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 13.606305] ==================================================================